Top Banner
Computer Crimes Brandon Besant Frank DeNick
29

Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Dec 17, 2015

Download

Documents

Bruno Fox
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Computer CrimesBrandon BesantFrank DeNick

Page 2: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

3 Phases of Hacking

Page 3: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Phase 1 (1960s – early 1970s) Defined as a person who wrote very elegant or

creative programs. Someone who likes to explore the details of programmable systems and how to stretch their capabilities. One who programs enthusiastically

Used their skills to create some of the first video games and operating systems

Mostly high school or college kids who hacked out of curiosity

These hackers wanted to test their own limits and the limits in place by the software and hardware designers

Page 4: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Phase 2 (1970s – mid 1990s) Definition changed throughout this time period. This is the period

where hacking took on its most common meaning used today New definition: someone who breaks into computer systems in

which the hackers do not have authorization By the 1980s hackers were in full swing Prime targets were: government defense systems, university

campus networks and large companies Started using social engineering techniques: pretending to be

someone that they are not Started using sniffers Adults started to catch on to the hacking scene because of

potential of a get rich quick mentality Countries started to see problems with being able to control the

international crime

Page 5: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Phase 3 (mid 1990s on) This era marked the growth of the world

wide web and e-commerce This phase includes all of the above

including new threats Intricacies to the web and the mass usage

made hacking more dangerous and damaging and more attractive to criminals

There is a lot more accessible info on the web

New hacking techniques started to surface

Page 6: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

What is Hacking? A hacker is a person who uses creative programming to

break into another computer system that they do not have access to otherwise

A hacker can be categorized in 5 ways:

1. Person who enjoys learning details of a programming language or system

2. Person who enjoys actually doing the programming rather than just theorizing about it

3. Person capable of appreciating someone else’s hacking4. Person who picks up programming quickly5. Person who is an expert at a particular programming

language or system

Page 7: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Hacking Activities Some activities hackers are prevalent at

include: Intentionally releasing viruses in

computer systems with the intention to cause harm

Steal sensitive personal, business and government information

Steal money or identity Crash websites and destroy files Etc.

Page 9: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Bot-herders What is a bot-herder? How does a bot-herder “herd”?

Virus E-mail virus

Worm Code Red worm

Trojan horse

Page 10: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Responsibility? What responsibilities do companies

have when they fire an employee?

Who is at fault if a hacker compromises your computer?

Page 11: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Crimes and Mandatory Sentences Aggravated sexual assault of a minor: 25 – 50 years Murder: 25 years Act of terrorism: 10 years Home invasion: 10+ years Sexual assault: 2, 5 or 10 years (depends on conduct and

victims age) Injury or risk of injury to a minor: 5 years Importing child pornography or possession: 5 years Carjacking: 3 years Selling drugs to minors: 2 years Kidnapping: 1+ years Possession of assault weapon: 1 year

Page 12: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Fast Food Hacker Suspect: Jason Cornish Occupation: IT Administrator Cost of Damages: $800, 000 Sentence? Was the sentence Jason Cornish fitting

for his crime?

Page 13: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Scenario:Who should receive a worse punishment? Suspect A: Seen as a rogue programmer Bottlenecked and sabotaged

projects to make his colleagues look bad

Was an unpleasant person to work with

Plotted a plan to create a program that would practically destroy the company when he got word about his impending release from the company

Suspect B: Was a great programmer who

used his skills to help the advancement of the company

Was always willing to help fellow employees when they had issues

Had employee of the year qualities and everybody got along with

Upon his release from the company due to downsizing, suspect B created a script that would cause crippling consequences to the future of the companies success and credibility

Page 14: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

What do you see? What does 64 characters or 6 lines of code = ?

Page 15: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Premeditated Attack!!! Suspect: Timothy Lloyd Occupation: IT Administrator Cost of Damages: $10 million Sentence? Was the sentence Timothy Lloyd

fitting for his crime?

Page 16: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Different Perspectives Is hacking necessarily stealing as it is

borrowing or just copying? Can hacking be categorized under theft? If there is vital information that may

tarnish ones reputation or career, is hacking wrong when protecting this reputation or career? (think deontological theory)

Page 17: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Can Hacking Be A good Thing?

Mark Zuckerberg considers himself to be a ‘Hacker’

“ It's an ideal that permeates the company's culture. It explains the push to try new ideas (even if they fail), and to promote new products quickly (even if they're imperfect).”

Zuckerberg considers Steve Jobs and Steve Wozniak to be hackers as well

He continues to write code hours on end even though he has hundreds to develop code

Page 18: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Some Thought Where would Facebook be without

hacking? How does media affect peoples views on

how society portrays terms like ‘hacker’

Page 19: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Iceman

Max Ray Butler (aka Max Vision)

2 million credit card numbers > $86 million in fraudulent charges

“White Hat” hacker Carders Forums

Hacker’s Hacker

Page 20: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Things to keep in mind…

The logistics

Responsibility

Motives

Utilitarian theory

i.e. Master Splyntr and U.S. Secret Service

Punishments

Page 21: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

The Plan

MSR206 and The Jerm

Is it too easy?

Page 22: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Responsibility Hijacking WiFi

Arms race

Page 23: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Motives

What are Max’s motives?

Underground vs. Mainstream

Page 24: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Victimless Crimes

An illegal act that is felt to have no

direct or identifiable victim

Examples, more examples

Is this a victimless crime?

Page 25: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Ethics

Utilitarianism

FBI – Master Splyntr The Secret Service and the mole

Page 26: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Punishments Shadowcrew

1 life lost vs. 1,000,000 lives ruined Can they be compared?

Page 27: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Questions to think about Is it always morally wrong to create

false web identities? Does it depend on the intention, or is it

somehow wrong in itself? If this false identity is for the better of

many can it still be ‘right’?

Page 28: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Rights Question Do people have the right to own

software? How would limiting the licensing on

software help improve software development?

Page 29: Computer Crimes Brandon Besant Frank DeNick. 3 Phases of Hacking.

Citations http://searchsecurity.techtarget.com/definition/hacker http://

www.cracked.com/article_19528_5-true-stories-that-prove-you-shouldnt-piss-off-it-guy_p2.html

http://www.usatoday.com/tech/news/story/2012-02-04/facebook-the-hacker-way/52959640/1

http://www.cga.ct.gov/2008/rpt/2008-R-0619.htm http://www.howstuffworks.com/virus.htm http://www.wired.com/threatlevel/2009/06/butler_court/ http://

www.usatoday.com/tech/news/story/2012-02-04/facebook-the-hacker-way/52959640/1

http://www.ldp.org.au/policies/1166-victimless-crimes http://

www.listmyfive.com/4aba2cad/The-Top-Five-Victimless-Crimes

http://www.thefreedictionary.com/victimless+crime