Skip to main content
  • Home
  • About
  • Faculty Experts
  • For The Media
  • ’Cuse Conversations Podcast
  • Topics
    • Alumni
    • Events
    • Faculty
    • Students
    • All Topics
  • Contact
  • Submit
  • All News
  • Arts & Culture
  • Business & Economy
  • Campus & Community
  • Health & Society
  • Media, Law & Policy
  • STEM
  • Veterans
  • University Statements
  • Syracuse University Impact
  • |
  • The Peel
  • Athletics
Sections
  • All News
  • Arts & Culture
  • Business & Economy
  • Campus & Community
  • Health & Society
  • Media, Law & Policy
  • STEM
  • Veterans
  • University Statements
  • Syracuse University Impact
  • |
  • The Peel
  • Athletics
  • Home
  • About
  • Faculty Experts
  • For The Media
  • ’Cuse Conversations Podcast
  • Topics
    • Alumni
    • Events
    • Faculty
    • Students
    • All Topics
  • Contact
  • Submit

Professor Explains How to Track a Computer Hacker

Wednesday, June 17, 2015, By Ellen Mbuqe
Share

“A typical footprint is the IP address of the computer. If you hack into a computer, there will be a record that shows what device actually connected with this computer. But an amateur hacker is easily caught, especially if they don’t remove the footprint,” says Professor of Cybersecurity Wenliang “Kevin” Du of the College of Engineering and Computer Science.

Wenliang "Kevin" Du

Wenliang “Kevin” Du

Professor Du is available for media inquiries regarding the hacking of the Houston Astros’ database. Reports indicate that it wasn’t very difficult to link the St. Louis Cardinals due to the footprint left by the hacker.

“The FBI has all the resources to track an IP address and can require an Internet service provider to release information about the person on the other end. Tracing the IP address back to the original computer is quite easy, but the question is whether the hacker is using their computer or hacking into someone else’s computer and using that device for the actual crime. That needs to be brought to court and additional evidence will still need to convince the judge. Professional hackers often comprise a computer belonging to others or those in another country. They also use public Wi-Fi or dial-in from public phone booth. These make tracking back to the hacker much more difficult. For example, if a computer in another country is used, the FBI then needs to obtain access to the computers used in the hacking, and that often requires international cooperation with law agencies in those countries, which can sometimes be difficult to obtain. ”

Professor Du is a cybersecurity researcher educator and has taught a course on hacking at Syracuse University. He can be reached at wedu@syr.edu or 315-443-9180. 

Du has developed more than 30 open source labs for educators to teach cybersecurity topics. Some of these labs include teaching students how to hack in order to learn how to prevent attacks. More than 250 educators in 26 countries have used the labs in their classes.

  • Author

Ellen Mbuqe

  • Recent
  • Co-President of Disability Law Society Eyes Career in National Security Law in Washington
    Thursday, July 31, 2025, By Jordan Bruenger
  • National Grid Summer College Scholars Program Invests in Energy Literacy
    Thursday, July 31, 2025, By Hope Alvarez
  • Lights, Camera, Imagination! Faculty Help Turn Teens’ Ideas Into Films (Video)
    Thursday, July 31, 2025, By Diane Stirling
  • Bowlers Wanted for Faculty and Staff Bowling League
    Thursday, July 31, 2025, By News Staff
  • Lender Center New York Event Gathers Wealth Gap Experts
    Wednesday, July 30, 2025, By Diane Stirling

Subscribe to SU Today

If you need help with your subscription, contact sunews@syr.edu.

Connect With Us

  • Facebook
  • @SyracuseUNews
  • Youtube
  • Facebook
  • Instagram
  • Youtube
  • LinkedIn
  • @SyracuseU
  • @SyracuseUNews
  • Social Media Directory
  • Accessibility
  • Privacy
  • Campus Status
  • Syracuse.edu
© 2025 Syracuse University News. All Rights Reserved.