In the hacking community, other White Hat labels are prevalent. For example, the Elite hackers are the gifted segment, recognized by their peers for their exceptional hacking talent. Elite hackers, who live by the White Hat Ethic, tend to avoid deliberately destroying data or otherwise damaging computer systems or networks.
In recent years, the term Â“eliteÂ” has been amended to include not only the generally accepted Â“principled tester of limitsÂ” but also Â“the high-tech saboteur detector.Â” These computer forensic investigators often use specialized software capturing what is known as a bit-stream image of a computerÂ’s hard drive, including every piece of data from the first to the last sectors. Even deleted files provide useful forensic information. Although most computer users realize that anyone can delete a file with a mouse click, forensic computer investigators know that the deleted file may still be there even after the computer says it is gone.
Forensic computer investigators realize that the Delete command just alters the way that a file is treated on a hard driveÂ’s table of contents. Thus, the space can be re-used but the information is still in it. So, until the computer needs the space and writes over the file (just as someone can record over information on a tape), not much has changed. The operating system will ignore the fileÂ’s existence as long as it has not been overwritten. It is for this reason that commercial software known as KillDisk Professional wipes disks clean and deletes files forever.
Finally, with the mainstreaming of the Internet has grown a political fever among White Hat hackers known as Â“hacker activism.Â” Hacker activists, or hacktivists, pair their activism needs with their hacker prowess to push for free speech and international human rights. The operations commonly used in White Hat hacktivism to further a cause include searching for information by browsing the Web; making Websites and posting information on them; transmitting e-publications and email to other interested parties; and using the Internet to form coalitions, discuss issues, and plan and coordinate activities.
It is not uncommon for White Hats in adulthood to have engaged in cracking incidents in their youth, though they may not always admit it. One case in point is that of Anthony Zboralski, whose cracking exploits in 1994 targeting the FBIÂ’s computers made him the poster boy for Â“social engineeringÂ” in France, his home country. In 2005, a decade after his highly reported exploits, Zboralski is the principal of Bellua Asia Pacific, a Jakarta-based IT security company whose clients include Air France, Allianz, and some of the countryÂ’s top banks and government agencies.