Hackers, Backers, Handlers And The Future

Every computer system, every data storage system , every IT platform, and every data transmission line or port can be hacked. It just takes expertise (in the form of an adrenaline-fueled, cerebrotonic young genius who sees the thrill of the challenge before applying any moral or other standards to the actions or to the potential use), excellent equipment (state-of-the-art) and a powerful, charismatic handler to point the hacker -for-hire in the desired direction required to meet the corporate or financial backer's directive. The term "hack" has become synonymous in modern tech-speak to any tool or method which makes things easier. It used to be a pejorative categorization - today it is something to be sought after in accessing utility or finding a workaround. Hacking , as a practical matter, is a reality, and as such should be dealt with. It can be prosecuted or promoted -- and in prosecuting it, the use of experts (i.e., hackers) will absolutely be required. In the ...