pp. Attempting to catch a computer hacker by tracing the path that the intruder used to infiltrate a system. —adj. Also: back hacking.

Example Citations:
It is less clear whether a country could pursue an information attacker electronically through the Internet, even if that pursuit required back-hacking through hubs in other countries, without violating the territorial integrity of those countries?
—Richard W. Aldrich, “How do you know you are at war in the information age?,“ Houston Journal of International Law, January 1, 2000

Based on system management software, like HP OpenView or Tivoli, the system can look for false positives and reroute good data back into the network. Once the decoy server has the malicious code it can also track and trace the code back to its source.

“It becomes a back-hacking device,“ said Ciongoli.
—Ephraim Schwartz, “Hardware and software to stop malicious code,“ InfoWorld Daily News, June 4, 2004

Earliest Citation:
Intrusions into government computers are detected only about 10 percent of the time....It is relatively easy to mask the true identity of the attacker and to lay false trails to frustrate “back hacking.“
—Gregory L. Vistica and Evan Thomas, “The Secret Hacker Wars,“ Newsweek, June 1, 1998

Related Words: