The IT Law Wiki


32,080pages on
this wiki
Add New Page
Add New Page Talk0

Definition Edit

Looping is

[a] technique in which hackers try to conceal their point of origin. Using this technique, hackers "leap frog" or loop through several computer systems before finally entering the system they intend to attack. The technique masks a hacker's actual origin from the system that is being attacked and from those pursuing him or her. Hackers will often ensure that the routing used to loop through the system crosses international and state borders. Crossing a border electronically has the same consequence as crossing it physically and will involve another country's or state's law enforcement agencies, which further complicates and slows efforts to pursue the hackers.[1]

References Edit

  1. The Electronic Intrusion Threat to National Security and Emergency Preparedness Telecommunications: An Awareness Document, at F-4.

Also on Fandom

Random Wiki