pp. Attempting to catch a computer hacker by tracing the path that the intruder used to infiltrate a system.
Also Seen As
Other Forms
Based on system management software, like HP OpenView or Tivoli, the system can look for false positives and reroute good data back into the network. Once the decoy server has the malicious code it can also track and trace the code back to its source.

"It becomes a back-hacking device," said Ciongoli.
—Ephraim Schwartz, “Hardware and software to stop malicious code,” InfoWorld Daily News, June 04, 2004
It is less clear whether a country could pursue an information attacker electronically through the Internet, even if that pursuit required back-hacking through hubs in other countries, without violating the territorial integrity of those countries?
—Richard W. Aldrich, “How do you know you are at war in the information age?,” Houston Journal of International Law, January 01, 2000
1998 (earliest)
Intrusions into government computers are detected only about 10 percent of the time….It is relatively easy to mask the true identity of the attacker and to lay false trails to frustrate "back hacking."
—Gregory L. Vistica & Evan Thomas, “The Secret Hacker Wars,” Newsweek, June 01, 1998
Filed Under