It
was during grade school when I created my first ever Username, for email
address, network gamings such as counterstrike, StarCraft and for chatting. I
was known as RICEACIDBURN :). I attached the character name of Angelina Jolie
(ACID BURN) from the movie HACKERS which was famous in the 90's. She was
partnered with another hacker named ZERO COOL.
Though the scenes in that movie
do not depict the real capacity of the modern hackers, it showed how hackers
can control machines which do not require their physical presence. How cool can
that be, you get to choose the movie that should be played in a channel. But
this is just the icing on the cake skill of hackers.
Recent news exposed the
aggressiveness of this gift, conflict between China and the Philippines
regarding the Spratly's Island. Hackers alleged to be located in China have
made themselves known to different websites owned, created in the Philippines
airing their anger toward Philippines claim over said piece of land. To answer
this blow, Filipino hackers united, and together avenged their country. Report
had not made mention of compromised security or network virus outbreak, but
this is very possible.
Computer hacking was considered as a crime against
international law. Obviously, computer system is available and accessible anywhere
and every state is a target by another state, this maybe another category for
terrorism attacks. Since hacking is considered as international crime, any
person convicted to be guilty of committing the act shall be punished according
to the rules which hopefully be concretized by the international justice
people. The case must be heard by the forum having jurisdiction of such crime.
The Philippines have not yet to strengthen their attempt to create a perfect
law as to create a perfect response to this dilemma. The E-commerce act does
not provide all forms of crimes committed in the cyber world. Unlike those
mentioned in the Budapest Convention on Cybercrime. I guess the best response
to this kind of crime, first educate the people, second- provide extraordinary
security, How? Use their strength against them by hiring the best hacker in the
country. :)