ClearanceJobs
  • Candidates
  • Job Search
  • Employers
  • Hiring Companies
  • News & Career Advice
  • Login
  • Register Now
ClearanceJobs
Log In
  • Candidates
  • Job Search
  • Employers
  • Hiring Companies
  • News & Career Advice
  • Register Now
  • Log In
  • Security Clearance
  • Career Advice
  • Intelligence
  • Career Fairs
  • Military Transition
  • OCONUS
  • DoD Contracts
  • Cybersecurity
  • Government Contractor
  • Recruiting
    Subscribe
    • ClearanceJobs
    • News & Career Advice

    Vigilante Hacking: Where True Crime, Ethical Hacking, and Cyber Law Collide


    Joe Jabara / Dec 1, 2021
    Cybersecurity clearance lawyer confidential legal settlements

    Occasionally there is a major intersection of several topics that are of interest to me, which makes that combination fascinating. Such is the case when true crime fanaticism, the law, ethical hacking, and cybersecurity meet in a collision known as vigilante hacking.

    Crowdsourcing and Ethical Hacking to Support Law Enforcement

    I am quite sure, at least from a distance, you are aware of the true crime craze in which podcasters, bloggers, and social media forums follow a specific case (usually unsolved and often a violent or victim based crime) in hopes that crowdsourcing and collective interest will help resolve justice for the victim. This is a very noble cause, and sometimes it has actually helped identify a valid suspect. However, without intelligence not known to the general public or obtainable through open sources, the quest for relevant information often can be misguided or worse (such as when an innocent person is defamed and shamed over the internet). This begs the question: is that all that can be done?

    Before I get into specifics, it is important to lay the groundwork for the law in the matter. The general rule is that evidence obtained from a private search, illegal or not, is admissible as long as the searcher was not working as an agent of the government. In other words, hacking into a prime suspect’s computer without probable cause at the direction of the FBI would not be admissible as evidence. So what are some real world examples of hacker vigilantism that withstood the scrutiny of the court and resulted in a conviction?

    • Planting Trojan viruses on images on websites to attract pedophiles. Once the files were open, the hacker could access the user’s computer and monitor activities.
    • Baiting an internet scammer into giving the hacker their credentials who in turn monitors, disrupts, and gathers evidence on the illegal behavior
    • Using fake online personas on the dark web to identify and shut down human traffickers.

    Vigilante Joe Brings About Justice

    Imagine the following scenario:  Vigilante Joe is highly interested in an unsolved murder case and joins several user groups on social media. Through OSINT, the rabid amateur investigators identify a suspect and publicly refer to him in online discussions. Vigilante Joe then phishes the suspect and inserts malware into the suspect’s computer allowing him to search it, where he finds images and a digital like stalking presence of the victim. Vigilante Joe looks further and locates online orders of a weapon that matches the one used in the murder. He then anonymously sends the information to law enforcement, who make the arrest. Sounds cool, right? Something out of the television series Mr. Robot? However, there are many pitfalls for all involved.

    • Unless the suspect confesses, who forensically captures the evidence and establishes the chain of custody if the hacker remains anonymous?
    • If the hacker is tracked down and treated by the letter of the law, he has still committed a crime and any evidence of leniency could be a motivation for other vigilantes.
    • If the evidence turns out to be false and Vigilante Joe’s identity is revealed, he and everyone else on the social media site could be liable for defamation and potentially charged criminally with doxing, if such a law exists in that jurisdiction.

    Intrusive or Deceptive Acts Are Not OSINT

    There are other scenarios where the above ethical/legal possibilities could come into play. A company could initiate a hack back type of counteroffensive to find a perpetrator and turn them in. This is a hot area of cyber law now where some jurisdictions are trying to come up with real guidance or policy. Then there is the hacktivist groups, like WikiLeaks and Anonymous, who by exposing wrongdoing may have uncovered criminal behavior. By all accounts, the evidence, while maybe not credible or preserved correctly, still could be admissible as part of the investigation of a criminal matter.

    To be clear, things such as geolocation of images on social media through highly sophisticated software, finding hidden meta data in various other media and piecing together behaviors associated with a crime by scouring everything about them on the internet or dark net, is Open Source Intelligence gathering which can be very productive and a genuine help to law enforcement. Be careful, however, of crossing that line into intrusive or deceptive acts that may make things worse, for both you and the people who are paid to seek and administer justice.

    Related News

    Sponsored
    Three Ways Booz Allen Is Using AI to Serve America
    Sponsored
    Leading with Heart: Gwen Clavon on Building Strong Teams in National Security
    Hackers Hacking Hackers
    IT Security
    Hackers Hacking Hackers
    hacker
    Cybersecurity
    How to Build an Ethical Hacker Lab
    Joe Jabara, JD, is the Director, of the Hub, For Cyber Education and Awareness, Wichita State University. He also serves as an adjunct faculty at two other universities teaching Intelligence and Cyber Law. Prior to his current job, he served 30 years in the Air Force, Air Force Reserve, and Kansas Air National Guard. His last ten years were spent in command/leadership positions, the bulk of which were at the 184th Intelligence Wing as Vice Commander.

    Browse ClearanceJobs

    By Location

    • Alabama
    • Arizona
    • California
    • Colorado
    • D.C.
    • Florida
    • Georgia
    • Maryland
    • Massachusetts
    • New Mexico
    • North Carolina
    • OCONUS
    • Ohio
    • South Carolina
    • Texas
    • Virginia

    By Job Category

    • Aerospace
    • Cyber Security
    • Facility Security
    • Finance
    • Administrative
    • Linguistics / Translator
    • Instructor / Trainer
    • Software
    • Hardware
    • Mechanical Engineering
    • Electrical Engineering
    • Systems Engineering
    • Military / Law Enforcement

    By Clearance Level

    • Unspecified
    • DoE Q or L
    • Dept of Homeland Security
    • Confidential
    • Secret
    • Top Secret
    • Top Secret/SCI
    • Intel Agency (NSA, CIA, FBI, etc)

    Most Read

    1. Intelligence Community Polygraphs in Scattered Castles
    2. Want Higher Pay? These States Lead Cleared Compensation in 2025
    3. Defense Spending Gears Up for Trillion-Dollar Boom and Anduril Is Hiring Thousands
    4. What is the SF-86C Form?

    Career Events

    • Career Conversations: Huntsville
    • Veterans & Military Spouses Event
    • FedWork Hiring Event
    • Cleared Women Event
    • View all Events

    Jobs By Location

    First Responder Mental Health Counselor Des Moines, IA
    HEAVY MOBILE EQUIPMENT MECHANIC Des Moines, IA
    Consulting Systems Engineer (IA/NE) Des Moines, IA
    Customer Technical Specialist Des Moines, IA
    Sr. Principal Military Trainer - Technical Support Team Lead Johnston, IA
    View all Iowa Jobs
    ClearanceJobs ClearanceJobs
    • About Us
    • Support
    • Browse Jobs
    • Security Clearance FAQs
    • FedWork
    • Blog
    • Privacy Policy
    • Terms of Service
    • Contact Us
    ClearanceJobs iOS App    ClearanceJobs Android App

    © 2025 ClearanceJobs - All rights reserved. ClearanceJobs is a DHI service.