Rent-a-hacker Site Leaks Australian Buyers Names And Addresses Essay


Describe about Rent-a-hacker Site Leaks Australian Buyers' Names and Addresses.



Nowadays computers are included in our day to day life; we cannot advance any work without computers. The computers are used to store, gather and manipulate important information and the IT technologies are used to secure the computers. Often there is a leak in the security system and is exploited by the hacker to gain access of the data (Richet, 2013). Hacking is not done to destroy the world. In 1970, the first personal computer was introduced and since then there hacking has changed its role in context to the society (, 2016).

This article explains about renting a professional hacker by an individual or business organization. This study also analyses the merits and demerits of renting a professional hacker and the legal action taken against any unethical hacking.

Rent-a-hacker site leaks Australian buyers' names and addresses:

Hacking is done, for several reasons and personal interest like a student studying in Washington try to hack into the server of the university to change his grade or an Australian woman hiring a website hacker to find his husband activities or a business organization trying to get the database of its rival to gain profit.

Many Australians think that they could hire a hacker from any website and make them work for their personal interest keeping their identity as a secret. But if a hacker is hired from a website there are norms where the person who wants to hire has to put his name and address and the hacking purpose. The identity cannot be kept secret; if any illegal activity is done there is a chance of taking legal action against the personnel (Halder et al., 2012).

Previously there was a condition provided by the Hacker's List that only the hacker and the person who have hired the hacker would know the details of the hacking purpose. The illegal activities have grown due to this condition, and media wrote various articles on unethical hacking across the world (Jaishankar & Ronel, 2013). All of the activities were not illegal, but some people tried to hack its business rivals database.

Before hiring a hacker, one should think twice because it may make him fall in an embarrassing moment. The job description to hire a hacker and the customer name and this location can be leaked by the site that may reveal the identity of the person hiring the hacker.

There are dozens of hacking request comes from several Australians who only want to regain their access to their account while others have unethical demands like changing their grades or gain access to the database of its rival company (Sch?ttle, 2015). Some company wants to hack the social account of their spouse to spy on them. Peoples are ready to give a lump sum of amount for both ethical and unethical hacking purpose. The Australians make a different kind of hacking request from the other peoples of the world. Charles Tendell is an ethical hacker, and he started a cybersecurity firm in Denver. He fights against the organization and people who does hacking for wrong reasons (Halder et al., 2012). Charles Tendell started the Hacker’s List from where the list of the people hiring hackers for any reasons can be found out. Jonathan Mayer hacked Hacker list and used a browser to run automated scripts to access the information on the site (Ablon et al., 2014). It was found that most of the requests on the Hackers list were unethical and contains a demand for business information, or personal information of other peoples and a huge part of the request was regarding increasing the grade of students.

Suburban School received nine bomb threats from any source in a week, and due to panic, the school was evacuated by police repeatedly. The threat came to the administration by an email and it also reached the students by social networking sites, and the computer system of the campus was shut downed by the theater. The local police and the sheriff's obtained information about the network and the account from where the message was sent; it was a bit difficult to identify because the traffic was re-routed through Italy and the username and all the other details were fake (Mayer, 2015). According to Mayer & Mitchell, (2012) they used a tool to find the culprit; they hacked the host computer from where the illegal activities were done and send a fake article, as the culprit loaded the story a malware also got installed on his computer (Halder et al., 2012). The location and the keystrokes can be recorded through the malware and police caught the culprit with all evidence; it was found that a teenage student was doing all these illegal activities sitting at home.


According to the Australian rules and regulations, a person caught off an illegal hacking offense faces jail of two to ten years depending on the crime that he has done. Hiring a hacker for any criminal activity is also considered as a crime and a punishment of 450 hours of community service can be sentenced for that. Hacking into a system to recover own data is also considered as an illegal activity since it would be considered as an unauthorized access and lead to prosecution.

There are two types of peoples who commit cyber crimes; one is the hacker, and the other is the crackers. Hackers use their programming capabilities to explore the details of a system. True hackers believe in technology and its security and the way of improving it. Hackers using their skills for evil reasons are known as crackers; they target the security of a system and try to breach it by any means. They can cause harm to the system, and their motivation behind hacking is to gain profit or take revenge or both. The primary objective of the cracker is that they want to make money with the data they steal from other computers by hacking.


Ablon, L., Libicki, M. C., & Golay, A. A. (2014). Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar. Rand Corporation.

Halder, D., Jaishankar, K., & Jaishankar, K. (2012). Cyber crime and the victimization of women: laws, rights and regulations. Information Science Reference.

Jaishankar, K., & Ronel, N. (Eds.). (2013). Global Criminology: Crime and Victimization in a Globalized Era. CRC Press.

Mayer, J. (2015). Constitutional Malware. Available at SSRN 2633247.

Mayer, J. R., & Mitchell, J. C. (2012, May). Third-party web tracking: Policy and technology. In Security and Privacy (SP), 2012 IEEE Symposium on(pp. 413-427). IEEE.

Pro, I., IT, S., & addresses, R. (2015). Rent-a-hacker site leaks Australian buyers' names and addresses.The Sydney Morning Herald. Retrieved 21 May 2016, from

Richet, J. L. (2013). From Young Hackers to Crackers. International Journal of Technology and Human Interaction (IJTHI), 9(3), 53-62.

Schottle, M. (2015). Hackers not Crackers. ATZelektronik worldwide, 10(4), 3-3.

How to cite this essay: