computer crimes brandon besant frank denick. 3 phases of hacking

29
Computer Crimes Brandon Besant Frank DeNick

Upload: bruno-fox

Post on 17-Dec-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Computer CrimesBrandon BesantFrank DeNick

Page 2: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

3 Phases of Hacking

Page 3: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Phase 1 (1960s – early 1970s) Defined as a person who wrote very elegant or

creative programs. Someone who likes to explore the details of programmable systems and how to stretch their capabilities. One who programs enthusiastically

Used their skills to create some of the first video games and operating systems

Mostly high school or college kids who hacked out of curiosity

These hackers wanted to test their own limits and the limits in place by the software and hardware designers

Page 4: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Phase 2 (1970s – mid 1990s) Definition changed throughout this time period. This is the period

where hacking took on its most common meaning used today New definition: someone who breaks into computer systems in

which the hackers do not have authorization By the 1980s hackers were in full swing Prime targets were: government defense systems, university

campus networks and large companies Started using social engineering techniques: pretending to be

someone that they are not Started using sniffers Adults started to catch on to the hacking scene because of

potential of a get rich quick mentality Countries started to see problems with being able to control the

international crime

Page 5: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Phase 3 (mid 1990s on) This era marked the growth of the world

wide web and e-commerce This phase includes all of the above

including new threats Intricacies to the web and the mass usage

made hacking more dangerous and damaging and more attractive to criminals

There is a lot more accessible info on the web

New hacking techniques started to surface

Page 6: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

What is Hacking? A hacker is a person who uses creative programming to

break into another computer system that they do not have access to otherwise

A hacker can be categorized in 5 ways:

1. Person who enjoys learning details of a programming language or system

2. Person who enjoys actually doing the programming rather than just theorizing about it

3. Person capable of appreciating someone else’s hacking4. Person who picks up programming quickly5. Person who is an expert at a particular programming

language or system

Page 7: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Hacking Activities Some activities hackers are prevalent at

include: Intentionally releasing viruses in

computer systems with the intention to cause harm

Steal sensitive personal, business and government information

Steal money or identity Crash websites and destroy files Etc.

Page 9: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Bot-herders What is a bot-herder? How does a bot-herder “herd”?

Virus E-mail virus

Worm Code Red worm

Trojan horse

Page 10: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Responsibility? What responsibilities do companies

have when they fire an employee?

Who is at fault if a hacker compromises your computer?

Page 11: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Crimes and Mandatory Sentences Aggravated sexual assault of a minor: 25 – 50 years Murder: 25 years Act of terrorism: 10 years Home invasion: 10+ years Sexual assault: 2, 5 or 10 years (depends on conduct and

victims age) Injury or risk of injury to a minor: 5 years Importing child pornography or possession: 5 years Carjacking: 3 years Selling drugs to minors: 2 years Kidnapping: 1+ years Possession of assault weapon: 1 year

Page 12: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Fast Food Hacker Suspect: Jason Cornish Occupation: IT Administrator Cost of Damages: $800, 000 Sentence? Was the sentence Jason Cornish fitting

for his crime?

Page 13: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Scenario:Who should receive a worse punishment? Suspect A: Seen as a rogue programmer Bottlenecked and sabotaged

projects to make his colleagues look bad

Was an unpleasant person to work with

Plotted a plan to create a program that would practically destroy the company when he got word about his impending release from the company

Suspect B: Was a great programmer who

used his skills to help the advancement of the company

Was always willing to help fellow employees when they had issues

Had employee of the year qualities and everybody got along with

Upon his release from the company due to downsizing, suspect B created a script that would cause crippling consequences to the future of the companies success and credibility

Page 14: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

What do you see? What does 64 characters or 6 lines of code = ?

Page 15: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Premeditated Attack!!! Suspect: Timothy Lloyd Occupation: IT Administrator Cost of Damages: $10 million Sentence? Was the sentence Timothy Lloyd

fitting for his crime?

Page 16: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Different Perspectives Is hacking necessarily stealing as it is

borrowing or just copying? Can hacking be categorized under theft? If there is vital information that may

tarnish ones reputation or career, is hacking wrong when protecting this reputation or career? (think deontological theory)

Page 17: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Can Hacking Be A good Thing?

Mark Zuckerberg considers himself to be a ‘Hacker’

“ It's an ideal that permeates the company's culture. It explains the push to try new ideas (even if they fail), and to promote new products quickly (even if they're imperfect).”

Zuckerberg considers Steve Jobs and Steve Wozniak to be hackers as well

He continues to write code hours on end even though he has hundreds to develop code

Page 18: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Some Thought Where would Facebook be without

hacking? How does media affect peoples views on

how society portrays terms like ‘hacker’

Page 19: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Iceman

Max Ray Butler (aka Max Vision)

2 million credit card numbers > $86 million in fraudulent charges

“White Hat” hacker Carders Forums

Hacker’s Hacker

Page 20: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Things to keep in mind…

The logistics

Responsibility

Motives

Utilitarian theory

i.e. Master Splyntr and U.S. Secret Service

Punishments

Page 21: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

The Plan

MSR206 and The Jerm

Is it too easy?

Page 22: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Responsibility Hijacking WiFi

Arms race

Page 23: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Motives

What are Max’s motives?

Underground vs. Mainstream

Page 24: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Victimless Crimes

An illegal act that is felt to have no

direct or identifiable victim

Examples, more examples

Is this a victimless crime?

Page 25: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Ethics

Utilitarianism

FBI – Master Splyntr The Secret Service and the mole

Page 26: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Punishments Shadowcrew

1 life lost vs. 1,000,000 lives ruined Can they be compared?

Page 27: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Questions to think about Is it always morally wrong to create

false web identities? Does it depend on the intention, or is it

somehow wrong in itself? If this false identity is for the better of

many can it still be ‘right’?

Page 28: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Rights Question Do people have the right to own

software? How would limiting the licensing on

software help improve software development?

Page 29: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking

Citations http://searchsecurity.techtarget.com/definition/hacker http://

www.cracked.com/article_19528_5-true-stories-that-prove-you-shouldnt-piss-off-it-guy_p2.html

http://www.usatoday.com/tech/news/story/2012-02-04/facebook-the-hacker-way/52959640/1

http://www.cga.ct.gov/2008/rpt/2008-R-0619.htm http://www.howstuffworks.com/virus.htm http://www.wired.com/threatlevel/2009/06/butler_court/ http://

www.usatoday.com/tech/news/story/2012-02-04/facebook-the-hacker-way/52959640/1

http://www.ldp.org.au/policies/1166-victimless-crimes http://

www.listmyfive.com/4aba2cad/The-Top-Five-Victimless-Crimes

http://www.thefreedictionary.com/victimless+crime