lesson plan cyber terrorism

18
Cyber-Terrorism ISO6C47L / Version 1 06 Aug 2004 SECTION I. ADMINISTRATIVE DATA All Courses Including This Lesson Course Number Version Course Title Task(s) Taught(*) or Supported Task Number Task Title Reinforced Task (s) Task Number Task Title Academic Hours The academic hours required to teach this lesson are as follows: Resident Hours/Methods 5 mins / Conference / Discussion 1 hr 20 mins / Lecture Test 0 hrs Test Review 0 hrs Total Hours: 1 hr 25 mins Test Lesson Number Hours Lesson No. Testing (to include test review) N/A Prerequisite Lesson(s) Lesson Number Lesson Title None Clearance Access Security Level: Unclassified Requirements: unclassified Foreign Disclosure Restrictions FD5. This product/publication has been reviewed by the product developers in coordination with the United States Army Intelligence Center and Fort Huachuca foreign disclosure authority. This product is releasable to students from all requesting foreign countries without restrictions. References Number Title Date Additional Information Student Study Assignments None Instructor Requirements One instructor per 25 students is required for the conference portions of this block of instruction. All instructors must be instructor certified IAW TR 350-70 and local policy. Additional Support Name Stu Ratio Qty Man Hours Personnel Requirements None Equipment Required Id Name Stu Ratio Instr Ratio Spt Qty Exp for Instruction 6730-01-T08-4239 Projector LitePro 25:1 1:25 No 1 No 1

Upload: alemayehu-tilahun

Post on 24-Dec-2015

10 views

Category:

Documents


1 download

DESCRIPTION

Lesson Plan Cyber Terrorism

TRANSCRIPT

Page 1: Lesson Plan Cyber Terrorism

Cyber-TerrorismISO6C47L / Version 1

06 Aug 2004

SECTION I. ADMINISTRATIVE DATA

All CoursesIncluding ThisLesson

Course Number Version Course Title

Task(s)Taught(*) orSupported

Task Number Task Title

Reinforced Task(s)

Task Number Task Title

AcademicHours

The academic hours required to teach this lesson are as follows:

ResidentHours/Methods

5 mins / Conference / Discussion1 hr 20 mins / Lecture

Test 0 hrsTest Review 0 hrs

Total Hours: 1 hr 25 mins

Test LessonNumber

Hours Lesson No.

Testing(to include test review) N/A

PrerequisiteLesson(s)

Lesson Number Lesson TitleNone

ClearanceAccess

Security Level: UnclassifiedRequirements: unclassified

ForeignDisclosureRestrictions

FD5. This product/publication has been reviewed by the product developers incoordination with the United States Army Intelligence Center and Fort Huachucaforeign disclosure authority. This product is releasable to students from allrequesting foreign countries without restrictions.

ReferencesNumber Title Date

AdditionalInformation

Student StudyAssignments

None

InstructorRequirements

One instructor per 25 students is required for the conference portions of this blockof instruction. All instructors must be instructor certified IAW TR 350-70 and localpolicy.

AdditionalSupport Name

StuRatio Qty Man Hours

PersonnelRequirements

None

EquipmentRequired

IdName

StuRatio

InstrRatio Spt Qty Exp

for Instruction 6730-01-T08-4239Projector LitePro

25:1 1:25 No 1 No

1

Page 2: Lesson Plan Cyber Terrorism

* Before Id indicates a TADSS

MaterialsRequired

Instructor Materials: lesson plan notes, and student hand outs

Student Materials: pen & paper for notes

Classroom,Training Area,and RangeRequirements

CLASSROOM, GEN INSTRUCTION, 1000 SQ FT, 30 PN

AmmunitionRequirements Id Name Exp

StuRatio

InstrRatio

SptQty

None

InstructionalGuidance

NOTE: Before presenting this lesson, instructors must thoroughly prepare by studying thislesson and identified reference material.

Instructor should review lesson plan and notes

ProponentLesson PlanApprovals

Name Rank Position Date

Page 3: Lesson Plan Cyber Terrorism

SECTION II. INTRODUCTION

Method of Instruction: Lecture Instructor to Student Ratio is: 1:25 Time of Instruction: 5 mins Media: Large Group Instruction

Motivator Ever since the world has been able to connect to the “Information SuperHighway”, there have been groups of people who would try to takeadvantage of the lack of security for this fledgling resource in order to makemoney, “crash” systems, pull pranks or practical jokes, or even such simplereasoning as just to see if they can. These people have traditionally beenlabeled as “hackers”. Over the years, hacking has become a hobby of sortsfor a lot of people. There have even been several popular Hollywood moviesabout the subject, in which hackers are elevated to folk hero status. But thefact of the matter is, is that computer crimes are just that: crimes. TheComputer Fraud and Abuse Act of 1986 has been amended several times tokeep up with the changes in technology and in 2001 was added to USPatriot Act legislation.

TerminalLearningObjective

NOTE: Inform the students of the following Terminal Learning Objective requirements.

At the completion of this lesson, you [the student] will:

Action: Identfy specic threats and weaknesses in regards to Cyber-Terrorism

Conditions: Given personal notes and handouts

Standards: Identify, within 100% accuracy, specifice threats and weaknesses inregards to Cyber-Terrorism

SafetyRequirements

There are no safety considerations.

RiskAssessmentLevel

Low - Low IV, E

EnvironmentalConsiderations

NOTE: It is the responsibility of all soldiers and DA civilians to protect the environment fromdamage.There are no environmental risks/considerations.

Evaluation Student evaluation will be conducted via checks on learning practical exercises andexams

Page 4: Lesson Plan Cyber Terrorism

InstructionalLead-In

Ever since the world has been able to connect to the “InformationSuper Highway”, there have been groups of people who would try totake advantage of the lack of security for this fledgling resource inorder to make money, “crash” systems, pull pranks or practicaljokes, or even such simple reasoning as just to see if they can.These people have traditionally been labeled as “hackers”. Over theyears, hacking has become a hobby of sorts for a lot of people.There have even been several popular Hollywood movies about thesubject, in which hackers are elevated to folk hero status. But thefact of the matter is, is that computer crimes are just that: crimes.The Computer Fraud and Abuse Act of 1986 has been amendedseveral times to keep up with the changes in technology and in 2001was added to US Patriot Act legislation.

Page 5: Lesson Plan Cyber Terrorism

SECTION III. PRESENTATION

1. Learning Step / Activity 1. Identfy specic threats and weaknesses in regards to Cyber-Terrorism

Method of Instruction: LectureInstructor to Student Ratio: 1:25

Time of Instruction: 1 hr 15 minsMedia: Large Group Instruction

Slide 1: Ever since the world has been able to connect to the “Information Super Highway”, therehave been groups of people who would try to take advantage of the lack of security for thisfledgling resource in order to make money, “crash” systems, pull pranks or practical jokes, oreven such simple reasoning as just to see if they can. These people have traditionally beenlabeled as “hackers”. Over the years, hacking has become a hobby of sorts for a lot of people.There have even been several popular Hollywood movies about the subject, in which hackers areelevated to folk hero status. But the fact of the matter is, is that computer crimes are just that:crimes. The Computer Fraud and Abuse Act of 1986 has been amended several times to keep upwith the changes in technology and in 2001 was added to US Patriot Act legislation.

Slide 2: The following block of instruction is Unclassified

Slide 3: Admin Data

Slide 4: These are the topics we are going to go over during this block of instruction.

Slide 5: Although there is no standard definition of cyber terrorism and cyber terrorists, theFederal Bureau of Investigation has offered these working definitions. When it comes to thedifference between normal hacking and actual cyber-terrorism, there isn’t much to speak of. Itbasically just boils down to the motivation of the attack, be it political or personal.

Slide 6: The same also goes for the persons carrying out the attack as well, hackers and cyber-terrorists. Is it political motivation or personal? However, whether or not the motivation ispolitical or personal, both can be punished under the Computer Fraud and Abuse Act, unless ofcourse, the person in question is a juvenile. In this block of instruction, we will be using theterms Cyber-terrorism, hacking, cyber-terrorist, and hacker interchangeably. Just keep in mindthat this is not always the case.

Slide 7: Here are some more useful definitions.

Slide 8: Hollywood has had a long history of over-glorifying criminals, and hackers are noexception. Even when the concept of using your computer to send and receive informationthrough phone lines was in its infancy, studios added fuel to the fire by adding Cold Warimplications and Hollywood stars in 1983’s War Games with Mathew Broderick. The movieactually spawned a boom in home hacking. The Net in 1995 showed the more sinister side ofcomputer crimes, but it revealed a mysterious side as well, which can make it more appealing toimpressionable viewers. Also in 1995, the movie Hackers, which received mixed reviews when itwas first released, has achieved a cult following amongst the hacking community. In fact, themovie's tag line “Their Crime Is Curiosity” was taken from “The Hacker’s Manifesto” written in

Page 6: Lesson Plan Cyber Terrorism

1986 by Loyd Blankenship, a.k.a The Mentor.

Slide 9: Loyd Blankenship (a.k.a. The Mentor) was a well known American computer hackerand in the 1980s, when he was a member of the hacker group The Legion of Doom. MrBlankenship hit the nail on the head with his closing statement. “You may stop this individual,but you can’t stop us all…” He wrote his “manifesto” and published it in an underground hackermagazine, Phrack, after being arrested by the Secret Service for computer crimes. But the factremains that, while you can get some of the persons involved in these types of crimes, there arefar too many computers in use and places for computer criminals to hide, that stopping all ofthem would be next to impossible.

Slide 10: The “golden age” of computer hackers was centered around Massachusetts Institute ofTechnology (MIT) in the 50s and 60s. Back then, computers were large, slow, and took aphenomenal effort to get them to do the simplest computation. The legendary feats of the earlyhackers are made all the more amazing by the primitive nature of the machines they were usingand the tools they had at their disposal.

Slide 11: The evolution of cyber-crime began with simple means, but superior intellect. Earlyhackers were what would be considered “computer geniuses”. But they were unorganized withlittle to no structure. Today the computer knowledge of hackers has receded, but thesophistication of the tools available to them has risen.

Slide 12: There are a lot of ways to attack computers, and as you can see here, the sophisticationof attacks has gone up as the computer knowledge required to carry them out has declined overthe years. This does not mean that intruders are becoming less smart, although the averageexpertise level may be declining. The red line indicates the sophistication of the tools and toolkitsused by attackers. The collective effect of both curves is that the information needed to break intoa system has become relatively flat over time.

Slide 13: The Electronic Numerical Integrator and Computer (ENIAC) was unveiled by the WarDepartment, precursor to the Department of Defense, in 1946. It covered an area of 1500 squarefeet, weighed 30 tons and cost about $400,000. It was originally developed to computecomplicated firing and bombing tables. The War Department boasted at the time that the firstproblem entered into ENIAC took about two hours of actual electronic computing time tocomplete.

Slide 14: The Altair 8800 is the world’s first “microcomputer” design from 1975. Originally soldas a kit through Popular Electronics magazine, the designers intended to sell only a few hundredto hobbyists, and were surprised when they sold over ten times that many in the first month. Thefirst programming language for the machine was Microsoft’s founding product, Altair BASIC.As the home computer revolution took hold in the early 1980s, Microsoft BASIC became themost creative programming language in the world.

Slide 15: How many people here have a personal computer at home? Approximately 159 millionpeople in the United States, 54% of the total population, use the internet. And that’s just thecomputers hooked up to the internet. Just think of the people who own a PC but don’t use theinternet. 30 years ago, this was unheard of. Because of the size and cost of the early computers,

Page 7: Lesson Plan Cyber Terrorism

the machines were built by large companies and installed at universities or industrial researchcenters. The average person never even saw a computer, let alone used one. That was all changedby a small group of hackers called the Homebrew Computer Club. These hackers wanted theirown machines that they could not only program at home, but also build and modify the computerhardware at home. This group of hackers included legendary figures such as Steve Jobs, CEO ofApple Computers; and Bill Gates, CEO of Microsoft; these men, among others, formed thefoundation for the entire personal computer industry as we know it today.

Slide 16: Student Check

Slide 17: Up until this point, computer hackers didn’t really crack into any systems that drew alot of attention. That is until 1983. Calling themselves the 414 Gang after their area code, sixMilwaukee teens embarked on a nine-day spree, hacking into 60 computing systems, includingcomputers at Los Alamos National Laboratory in New Mexico, before being arrested by the FBI.

Slide 18: The Morris worm was one of the first internet distributed computer worms; it isconsidered the first worm virus and was certainly the first to gain significant mainstream mediaattention. It was written by Robert Morris, and launched on November 2, 1988 from MIT inorder to hide the fact that it actually came from Cornell University. Morris claimed that theworm, which brought the Internet to its knees, was a benign experiment that got out of control asthe result of a coding error. A federal grand jury indicted Morris on in 1989 for releasing theworm. He thus became the first person to be prosecuted under the Computer Fraud and AbuseAct of 1986. He was convicted in 1990, and sentenced to three years' probation, 400 hours'community service, and a $10,000 fine. The Ironic part of the story is that Morris’ father, RobertMorris Sr., was the chief security expert at the National Security Agency at the time. The Morrisworm was not written to cause damage but to spread. Bugs in the code, however, caused it to bemore damaging - a computer could be infected multiple times and each additional process wouldslow the machine down to the point it would be unusable. Around 6,000 major UNIX machineswere infected by the Morris worm, and the Government Accountability Office put the cost of thedamage at $10m - $100m.

Slide 19: In 1997, a hacker disabled the computer system of an airport control tower at theWorcester, Mass. Airport. No accidents were caused, but service was affected. Also in 1997, ahacker in Sweden jammed the 911 emergency telephone systems all throughout west-centralFlorida. Also in 1998, the Defense Department was attacked, and hackers accessed personnel andpayroll information.

Slide 20: In 1998, NASA, Navy, and university computers were attacked. Servers were preventedfrom answering network connections and many computers crashed. In 2001, two post-graduatestudents cracked a bank system used by banks and credit card companies to secure the personalidentification numbers of their customers’ accounts. The same system is used by the U.S.Treasury Department to sell bonds and treasury bills to the public over the Internet. Throughthese examples, it is evident that a cyber terrorist, with the correct training, may be able to doextreme damage to the government, private corporations, and civilians

Slide 21: As the old saying goes “There is more than one way to skin a cat”, this also applies tocyber-terrorism. Computer hacking is multi-facetted. Sometimes, computer systems can be

Page 8: Lesson Plan Cyber Terrorism

protected against one kind of approach, while extremely vulnerable to another. Here are a fewpopular approaches that hackers use against the computer using public.

Slide 22In computer security terminology, a virus is a piece of program code that, just like abiological virus, makes copies of itself and spreads by attaching itself to a host, often damagingthe host in the process. The host is another computer program, often a computer operatingsystem, which then infects the applications that are transferred to other computers. While virusescan be (and often are) malicious, many are fairly benign or merely annoying (for example,displaying a message to the user). Many such viruses have a delayed payload, like theMichelangelo Virus, playing a message on a specific holiday, day of the month, or time of day; orwaiting for a certain number of infections or reboots, or randomly occurring with a small chance."Good" viruses have also appeared that spread improvements to the programs they infected, ordelete other viruses. These are, however, quite rare, still consume system resources, and mayaccidentally damage systems they infect.

Slide 23: A computer worm is a self-replicating computer program similar to a virus. While avirus attaches to and becomes part of another executable program, a worm is self-contained anddoes not need to be part of another program to propagate itself. In addition to replication, a wormmay be designed to do any number of things, such as delete files on a host system or senddocuments via e-mail. More recent worms may be multi-headed and carry other executable filesas a payload. However, even in the absence of such a payload, a worm can wreak havoc just withthe network traffic generated by its reproduction. The Mydoom worm, for example, caused anoticeable worldwide Internet slowdown at the peak of its spread (Jan, 2004).

Slide 24: A Trojan horse differs from a virus in that it is a stand-alone program, it does not attachto other programs or files. And it differs from a worm because it does not move from onecomputer to another on its own. A person must transfer and run it deliberately, such as by emailor by posting it to a download area where it could be downloaded by a victim. Trojans arecomputer programs which claim to be harmless but instead have a malicious effect, one whichthe programmer intends and the user doesn’t expect. The term is derived from the classical mythof the same name, and the effect is pretty much the same. A simple example of a Trojan horsewould be a program named “WINNER.EXE" that is posted with a promise of “big prizes"; but,when run, it instead erases all the files on the computer and displays a taunting message.

Slide 25: Strictly defined, spyware consists of computer software that gathers information abouta computer user without the user's knowledge or informed consent, and then transmits thisinformation to an external entity, usually one that expects to be able to profit from it in someway. More broadly, the term spyware applies to a wide range of related malicious softwareproducts which do not constitute spyware in the strict sense. These products perform manydifferent functions, including the delivery of un-requested advertising (pop-ups in particular),harvesting private information, re-routing page requests to illegally claim commercial sitereferral fees, and installing stealth phone dialers, in an attempt to quietly connect the user to along distance ISP. Spyware generally does not self-replicate. Where a virus relies on users withpoor security habits in order to spread, and spreads as far as possible in an inconspicuous way (inorder to avoid detection and removal), spyware usually relies on persuading ignorant or naiveusers to download and install it by offering some kind of bait. The ideal piece of spyware installsitself in such a way that it starts up every time the computer starts up, using CPU cycles and

Page 9: Lesson Plan Cyber Terrorism

Random Access Memory (RAM), and reducing stability and runs at all times, monitoringInternet usage and delivering targeted advertising to the infected system. Spyware generally doesnot damage the user's data files. In fact (apart from the intentional privacy invasion andbandwidth theft), the overwhelming majority of the harm inflicted by spyware comes aboutsimply as an unintended byproduct of the data-gathering or other primary purpose.

Slide 26: Spamming is the act of sending unsolicited electronic messages in bulk. E-mail spam isby far the most common form of spamming on the internet. It involves sending identical ornearly identical messages to a large number of recipients. Unlike legitimate commercial e-mail,spam is generally sent without the explicit permission of the recipients, and frequently containsvarious tricks to bypass e-mail filters. Many e-mail spammers go to great lengths to conceal theorigin of their messages. They might do this by spoofing e-mail addresses. In this technique, thespammer modifies the e-mail message so it looks like it is coming from another e-mail address.Spam's direct effects include the consumption of computer and network resources and the cost inhuman time and attention of dismissing unwanted messages.

Slide 27: Student check

Slide 28: Our home computers are not the only things that are vulnerable to hackers/cyber-terrorists. When you think about it, in today’s day and age, almost everything we rely on is run bycomputers; computers that are potentially vulnerable to attacks. Here are just a few of the thingsmost of us depend on a regular basis, which if attacked, would have disastrous results.

Slide 29: If someone hacked into your account and stole all of your money in it, the ramificationsto yourself would be obvious. Very few people have their assets diversified enough so that if thishappens, they wouldn’t be ruined. And if it happened to you, it would be tough to get reimbursedthe money lost. But just for a second, let’s think “outside the box” and look at it from the Bank’sperspective. It is said that roughly 80% of cyber terrorism incidents in the financial sector gounreported to law enforcement agencies. Computerworld magazine reported in November, 2002that employees keep many of these incidents from senior banking executives "due to the realitythat they may be fired." Banks don't report these incidents mainly because they want to maintaincustomer and investor trust. The fact of the matter is that, by and large, most banks don’t wanthacking incidents known to the general public out of fear that there would be a nationwidebanking scare.Slide 30: Has anyone here seen the 1990 movie, Die Hard 2? In the movie, the hero, JohnMcClane, is battling terrorists at the Washington Dulles airport who have gained access to, andtaken over the landing system and blacked out the entire airport. At one point, they impersonatethe tower and crash a plane. While this is a very extreme perspective, the basics are still thesame. A well trained, well motivated individual with the right equipment can cripple the travelindustry. And this doesn’t apply to just air travel. Train track switch systems can also bevulnerable. How does the old word problem go? A train leaves Chicago, westbound at 10 a.m.going 60 m.p.h. Another train leaves L.A. at the same time and speed going east. What wouldhappen if the two trains me head on in Denver at the combined speed of 120 miles per hour?

Slide 31: A group calling itself the "United Loan Gunmen" posted an obviously false story on thesite for a short amount of time under the headline, "United Loan Gunmen take control ofNASDAQ stock market.” Despite claims in the story that the cyber gang had "uprooted" the

Page 10: Lesson Plan Cyber Terrorism

Website, the only effects of the intrusion seemed to be defacing of the home page. The phonypage stayed up only a few minutes before NASDAQ's Web servers automatically detected andremoved it. Although the financial structure itself wasn’t attacked for monetary gains, the stockmarket is finicky at best. Any sense of instability could send it into a downward spiral the likes ofwhich haven’t been seen since the Great Depression.

Slide 32: Strictly defined, a computer network is a system for communication among two ormore computers. In actuality, when it comes to businesses, and more close to home, the Army,very rarely do networks have only two computers on them. Most of the time, they consist ofhundreds, if not thousands of systems in them. Most networks have anti-virus programs on themthat can be constantly updated for new viruses, but most viruses are also updated to sneak pastthese programs. One day a virus might be detected, isolated, and erased by anti-virus software,but the next, it could be renamed or reprogrammed and slip right past the “firewall”. If a viruscan get through and on to one computer, it can then move freely between and damage othercomputers on the same network. Depending on how long before the virus and infected systemsare isolated, it can do heavy damage, resulting in the loss of several man hours and even theinfected systems themselves. As an example, I received an e-mail from a “friend” with anattachment on it (a la trojan horse). When I opened the attachment, it infected my computer withwhat is known as the Beagle virus. The virus was instantly located, quarantined, and deletedfrom my system in about 10 minutes. The next morning, a routine virus scan on my hard driverevealed 137 files infected with the same virus, just renamed. It took a full day to “clean” myhard drive. And that was just my computer. Luckily it was isolated before it spread, but that isn’talways the case.

Slide 33: Student Check

Slide 34: As with any aspect of terrorism, including cyber-terrorism, there are governmentregulations in place to punish perpetrators of these crimes. However, laws aren’t always anadequate deterrent. Most hackers actually believe they won’t get caught, and in many cases,they’re right. And honestly, if a hacker wants access to your personal information bad enough,they are going to get it. Unless, of course, you take the proper precautions. Here are somepersonal protective measures that can be taken to protect ourselves.

Slide 35: Yes, it is convenient. Yes, I know we all hate going to the bank or dealing with the longlines and shortage of open registers at the Best Buy. Most of us use this “revolutionary” featureprovided by most banks and retailers. I use it myself. I’m not standing on my soapbox saying“Fear the tool of the devil known as ‘online banking’”. But if you are going to use it, make surethe bank or merchant uses some sort of encryption method to protect your password, accountnumber, and other important information. On common encryption system used is called SecureSockets Layer, or SSL, developed by Netscape Communications Corporation. Also, inquire as towhat systems they use to protect their computer network so outsiders can’t gain access to yourprecious information. Most banks and retailers would be happy to oblige you, they want yourbusiness. If they don’t provide you with the adequate information, take you business elsware.Period.

Slide 36: As with banking, do research as to which anti-virus software would be right for you.Some of the most popular programs are Symantec (a.k.a. Norton), McAfee, AVG, and Panda.

Page 11: Lesson Plan Cyber Terrorism

Besides the fact that these programs protect your personal computer from viruses, worms, etc.,the best part is, is that, for the most part, you don’t have to buy a new package every time a newvirus comes out. You can usually go to the company’s web site and download free updates thatkeep up with the changes of viruses.

Slide 37: Former President Calvin Coolidge had it right, “Persistence alone is omnipotent”. Notobserving proper security measures when it comes to protecting yourself against cyber-terrorismmay cost a little, either with time or money. But it won’t cost as much as not observing them.Imagine you get your bank statement in the mail, complete with account number and availablebalance. After you are done with it, you then take it to the fireplace and burn it. Done, problemsolved. Now, imagine what would happen if you didn’t destroy it, and just threw it in thegarbage. It blows out of the back of the garbage truck on the way to the landfill and happens tofall into the hands of someone with a computer who knows how to use it and isn’t afraid ofbreaking the rules to suit their needs. The next day, you check your balance and BOOM!!! Theregoes your family vacation to Disneyland you’ve been planning for a year. In the end, it will costyou more than the few seconds it would have taken to light the match.

Slide 38: These are the topics that we discussed during this block of instruction.

Slide 39: Here’s the deal, if a hacker wants to gain access to your most personal information, beit credit card numbers, account balances, or social security numbers, they will. That is, unless youtake the proper steps to protect yourself and your interests. Let me say that again, because it bearsrepeating. UNLESS YOU TAKE THE PROPER STEPS TO PROTECT YOURSELF ANDYOUR INTERESTS. As with any enemy, in order to defeat hackers, you must understand thefact that there is a threat, and anyone is a potential target. Be vigilant when it comes to protectingyourself, know your enemy and their weapons of choice, and keep your computers, andyourselves, safe.

Slide 40: Are there any questions at this time?

Student Handout:

The Hacker's Manifesto by: The Mentor a.k.a. Loyd Blankenship

Another one got caught today; it's all over the papers. "Teenager Arrested in Computer CrimeScandal", "Hacker Arrested after Bank Tampering." "Damn kids. They're all alike." But did you,in your three-piece psychology and 1950's techno brain, ever take a look behind the eyes of thehacker? Did you ever wonder what made him tick, what forces shaped him, what may havemolded him? I am a hacker, enter my world. Mine is a world that begins with school. I'm smarterthan most of the other kids, this crap they teach us bores me. "Damn underachiever. They're allalike." I'm in junior high or high school. I've listened to teachers explain for the fifteenth timehow to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in myhead." "Damn kid. Probably copied it. They're all alike." I made a discovery today. I found acomputer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's becauseI screwed it up. Not because it doesn't like me, or feels threatened by me, or thinks I'm a smartass, or doesn't like teaching and shouldn't be here. Damn kid. All he does is play games. They'reall alike. And then it happened... a door opened to a world... rushing through the phone line like

A-11

Page 12: Lesson Plan Cyber Terrorism

heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-dayincompetencies is sought... a board is found. "This is it... this is where I belong..." I knoweveryone here... even if I've never met them, never talked to them, may never hear from themagain... I know you all... Damn kid. Tying up the phone line again. They're all alike... You betyour ass we're all alike... we've been spoon-fed baby food at school when we hungered forsteak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've beendominated by sadists, or ignored by the apathetic. The few that had something to teach found uswilling pupils, but those few are like drops of water in the desert. This is our world now... theworld of the electron and the switch, the beauty of the baud. We make use of a service alreadyexisting without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, andyou call us criminals. We explore... and you call us criminals. We seek after knowledge... andyou call us criminals. We exist without skin color, without nationality, without religious bias...and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie tous and try to make us believe it's for our own good, yet we're the criminals. Yes, I am a criminal.My crime is that of curiosity. My crime is that of judging people by what they say and think, notwhat they look like. My crime is that of outsmarting you, something that you will never forgiveme for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stopus all... after all, we're all alike.

NOTE: Conduct a check on learning and summarize the learning activity.

Page 13: Lesson Plan Cyber Terrorism

SECTION IV. SUMMARY

Method of Instruction: Conference / Discussion Instructor to Student Ratio is: 1:25 Time of Instruction: 5 mins Media: Large Group Instruction

Check onLearning

Determine if the students have learned the material presented by soliciting studentquestions and explanations. Ask the students questions and correctmisunderstandings.

Review /SummarizeLesson

Here’s the deal, if a hacker wants to gain access to your most personalinformation, be it credit card numbers, account balances, or social securitynumbers, they will. That is, unless you take the proper steps to protectyourself and your interests. Let me say that again, because it bears repeating.UNLESS YOU TAKE THE PROPER STEPS TO PROTECTYOURSELF AND YOUR INTERESTS. As with any enemy, in order todefeat hackers, you must understand the fact that there is a threat, andanyone is a potential target. Be vigilant when it comes to protectingyourself, know your enemy and their weapons of choice, and keep yourcomputers, and yourselves, safe.Are there any questions at this time?

C-13

Page 14: Lesson Plan Cyber Terrorism

SECTION V. STUDENT EVALUATION

TestingRequirements

NOTE: Describe how the student must demonstrate accomplishment of the TLO. Referstudent to the Student Evaluation Plan.

Student Evaluation will be conducted via checks on learning practical exercisesand exams.

FeedbackRequirements

NOTE: Feedback is essential to effective learning. Schedule and provide feedback on theevaluation and any information to help answer students' questions about the test. Provideremedial training as needed.

Instructor Student Test Review

Page 15: Lesson Plan Cyber Terrorism

Appendix A - Viewgraph Masters (N/A)

Page 16: Lesson Plan Cyber Terrorism

Appendix B - Test(s) and Test Solution(s) (N/A)

Page 17: Lesson Plan Cyber Terrorism

Appendix C - Practical Exercises and Solutions (N/A)

Page 18: Lesson Plan Cyber Terrorism

Appendix D - Student Handouts (N/A)