computer crimes brandon besant frank denick. 3 phases of hacking
TRANSCRIPT
![Page 1: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/1.jpg)
Computer CrimesBrandon BesantFrank DeNick
![Page 2: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/2.jpg)
3 Phases of Hacking
![Page 3: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/3.jpg)
Phase 1 (1960s – early 1970s) Defined as a person who wrote very elegant or
creative programs. Someone who likes to explore the details of programmable systems and how to stretch their capabilities. One who programs enthusiastically
Used their skills to create some of the first video games and operating systems
Mostly high school or college kids who hacked out of curiosity
These hackers wanted to test their own limits and the limits in place by the software and hardware designers
![Page 4: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/4.jpg)
Phase 2 (1970s – mid 1990s) Definition changed throughout this time period. This is the period
where hacking took on its most common meaning used today New definition: someone who breaks into computer systems in
which the hackers do not have authorization By the 1980s hackers were in full swing Prime targets were: government defense systems, university
campus networks and large companies Started using social engineering techniques: pretending to be
someone that they are not Started using sniffers Adults started to catch on to the hacking scene because of
potential of a get rich quick mentality Countries started to see problems with being able to control the
international crime
![Page 5: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/5.jpg)
Phase 3 (mid 1990s on) This era marked the growth of the world
wide web and e-commerce This phase includes all of the above
including new threats Intricacies to the web and the mass usage
made hacking more dangerous and damaging and more attractive to criminals
There is a lot more accessible info on the web
New hacking techniques started to surface
![Page 6: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/6.jpg)
What is Hacking? A hacker is a person who uses creative programming to
break into another computer system that they do not have access to otherwise
A hacker can be categorized in 5 ways:
1. Person who enjoys learning details of a programming language or system
2. Person who enjoys actually doing the programming rather than just theorizing about it
3. Person capable of appreciating someone else’s hacking4. Person who picks up programming quickly5. Person who is an expert at a particular programming
language or system
![Page 7: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/7.jpg)
Hacking Activities Some activities hackers are prevalent at
include: Intentionally releasing viruses in
computer systems with the intention to cause harm
Steal sensitive personal, business and government information
Steal money or identity Crash websites and destroy files Etc.
![Page 8: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/8.jpg)
http://money.cnn.com/2011/10/27/technology/rsa_hack_widespread/index.htm
![Page 9: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/9.jpg)
Bot-herders What is a bot-herder? How does a bot-herder “herd”?
Virus E-mail virus
Worm Code Red worm
Trojan horse
![Page 10: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/10.jpg)
Responsibility? What responsibilities do companies
have when they fire an employee?
Who is at fault if a hacker compromises your computer?
![Page 11: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/11.jpg)
Crimes and Mandatory Sentences Aggravated sexual assault of a minor: 25 – 50 years Murder: 25 years Act of terrorism: 10 years Home invasion: 10+ years Sexual assault: 2, 5 or 10 years (depends on conduct and
victims age) Injury or risk of injury to a minor: 5 years Importing child pornography or possession: 5 years Carjacking: 3 years Selling drugs to minors: 2 years Kidnapping: 1+ years Possession of assault weapon: 1 year
![Page 12: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/12.jpg)
Fast Food Hacker Suspect: Jason Cornish Occupation: IT Administrator Cost of Damages: $800, 000 Sentence? Was the sentence Jason Cornish fitting
for his crime?
![Page 13: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/13.jpg)
Scenario:Who should receive a worse punishment? Suspect A: Seen as a rogue programmer Bottlenecked and sabotaged
projects to make his colleagues look bad
Was an unpleasant person to work with
Plotted a plan to create a program that would practically destroy the company when he got word about his impending release from the company
Suspect B: Was a great programmer who
used his skills to help the advancement of the company
Was always willing to help fellow employees when they had issues
Had employee of the year qualities and everybody got along with
Upon his release from the company due to downsizing, suspect B created a script that would cause crippling consequences to the future of the companies success and credibility
![Page 14: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/14.jpg)
What do you see? What does 64 characters or 6 lines of code = ?
![Page 15: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/15.jpg)
Premeditated Attack!!! Suspect: Timothy Lloyd Occupation: IT Administrator Cost of Damages: $10 million Sentence? Was the sentence Timothy Lloyd
fitting for his crime?
![Page 16: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/16.jpg)
Different Perspectives Is hacking necessarily stealing as it is
borrowing or just copying? Can hacking be categorized under theft? If there is vital information that may
tarnish ones reputation or career, is hacking wrong when protecting this reputation or career? (think deontological theory)
![Page 17: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/17.jpg)
Can Hacking Be A good Thing?
Mark Zuckerberg considers himself to be a ‘Hacker’
“ It's an ideal that permeates the company's culture. It explains the push to try new ideas (even if they fail), and to promote new products quickly (even if they're imperfect).”
Zuckerberg considers Steve Jobs and Steve Wozniak to be hackers as well
He continues to write code hours on end even though he has hundreds to develop code
![Page 18: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/18.jpg)
Some Thought Where would Facebook be without
hacking? How does media affect peoples views on
how society portrays terms like ‘hacker’
![Page 19: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/19.jpg)
Iceman
Max Ray Butler (aka Max Vision)
2 million credit card numbers > $86 million in fraudulent charges
“White Hat” hacker Carders Forums
Hacker’s Hacker
![Page 20: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/20.jpg)
Things to keep in mind…
The logistics
Responsibility
Motives
Utilitarian theory
i.e. Master Splyntr and U.S. Secret Service
Punishments
![Page 21: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/21.jpg)
The Plan
MSR206 and The Jerm
Is it too easy?
![Page 22: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/22.jpg)
Responsibility Hijacking WiFi
Arms race
![Page 23: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/23.jpg)
Motives
What are Max’s motives?
Underground vs. Mainstream
![Page 24: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/24.jpg)
Victimless Crimes
An illegal act that is felt to have no
direct or identifiable victim
Examples, more examples
Is this a victimless crime?
![Page 25: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/25.jpg)
Ethics
Utilitarianism
FBI – Master Splyntr The Secret Service and the mole
![Page 26: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/26.jpg)
Punishments Shadowcrew
1 life lost vs. 1,000,000 lives ruined Can they be compared?
![Page 27: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/27.jpg)
Questions to think about Is it always morally wrong to create
false web identities? Does it depend on the intention, or is it
somehow wrong in itself? If this false identity is for the better of
many can it still be ‘right’?
![Page 28: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/28.jpg)
Rights Question Do people have the right to own
software? How would limiting the licensing on
software help improve software development?
![Page 29: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking](https://reader033.vdocuments.net/reader033/viewer/2022051516/56649ce35503460f949afd34/html5/thumbnails/29.jpg)
Citations http://searchsecurity.techtarget.com/definition/hacker http://
www.cracked.com/article_19528_5-true-stories-that-prove-you-shouldnt-piss-off-it-guy_p2.html
http://www.usatoday.com/tech/news/story/2012-02-04/facebook-the-hacker-way/52959640/1
http://www.cga.ct.gov/2008/rpt/2008-R-0619.htm http://www.howstuffworks.com/virus.htm http://www.wired.com/threatlevel/2009/06/butler_court/ http://
www.usatoday.com/tech/news/story/2012-02-04/facebook-the-hacker-way/52959640/1
http://www.ldp.org.au/policies/1166-victimless-crimes http://
www.listmyfive.com/4aba2cad/The-Top-Five-Victimless-Crimes
http://www.thefreedictionary.com/victimless+crime