Upload
lamphuc
View
219
Download
0
Embed Size (px)
Citation preview
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 1
From Phone Phreaking to Cyber War: Cyber Crime’s Impact
on Business
An Economic Impact Study for Risk Assessment
Jack L. Worsham
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 2
Abstract
This paper presents an examination of some of the earliest cyber crimes: hacking, phone
phreaking, and cracking. The paper presents a historical view of how each type of cyber
crime began, how it was viewed, and what it intended to accomplish. This is the beginning
of a much larger project that will examine all cyber crimes and how each has impacted
business. The purpose is to present the historical context, the why, and the target of cyber
crimes in order for network managers and network security personnel to perform a more
accurate risk analysis and risk management of their network assets. The more aware
businesses are of different cyber crimes the more selective they can target their
countermeasures and save on their IT security budgets.
The literature review and annotated bibliography will analyze different secondary sources
to demonstrate the different articles that were considered and how the usefulness of an
article was determined.
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 3
Table of Contents
Abstract .................................................................................................................................. 2
Introduction ............................................................................................................................ 4
From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business .......................... 5
Background ............................................................................................................................ 5
The Dawn of the Phone Phreak ............................................................................. 6
Rise of the Cracker............................................................................................... 11
Literature Reviews ............................................................................................... 14
Article Summaries ............................................................................................... 15
Research Article Comparisons ............................................................................. 18
Research Article Strengths and Weaknesses ....................................................... 19
Research Field Applications ................................................................................ 21
Topic Coverage Differences ................................................................................ 22
Conclusion ........................................................................................................................... 24
Bibliography ........................................................................................................................ 26
Annotated Bibliography ....................................................................................................... 28
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 4
Introduction
This paper examines different cyber crimes, cyber criminals, techniques and targets
by comparing different articles and then demonstrating the criteria used for determining
secondary source suitability. The following questionnaire was used to determine the
aptness of secondary articles for scholarly research:
Was the article a book review or editorial?
Was a peer review statement present?
Did the article include references, footnotes, or a bibliography?
Was the article longer than 5 pages?
Did the article report new academic research studies, including methodology
and data analysis?
Did the article give the author’s title, affiliation, and contact information?
Did the article have very few advertisements or images in print or PDF
version?
Was the article relevant?
What is the result of the believing and doubting test?
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 5
From Phone Phreaking to Cyber War: Cyber Crime’s Impact
on Business
Background
Network users, business managers, and IT staff need to understand the different
cyber crimes and their related targets in order to plan their countermeasures.
Different cyber crimes have different targets. Some of the first cyber crimes were
actually intended to help the general public. At the beginning of the computer age smart
hardware and software hobbyists wanted to improve how their computers operated.
Techniques were passed down to help other enthusiasts until certain improvements became
common knowledge. These early underground engineers became known as hackers. Some
would argue that these hackers stole business opportunities from hardware and software
companies. Some argue that without these hackers the number of computer users would
have been dramatically less. In fact, the argument claims that hackers created the computer
business.
Trigaux (2006), in the article “History of Hacking” in the St. Petersburg Times,
summarized the different hacker mindsets when he said, “Depending on whom you ask,
hackers are harmless pranksters, curious techies, noble freedom fighters or dangerously
unpredictable cyber-terrorists (see figure 1: How Hackers See Themselves). As the world
goes online, hackers' potential influence and menace grows.”
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 6
Figure 1: How Hackers See Themselves
Source: Daryl Cagle’s Professional Cartoonists Index
The Dawn of the Phone Phreak
The precursor to the modern day hacker was a group of underground electronic
hobbyists known as phone phreakers. The term phone phreaking came from the phrase
“free use of the phone.” Phone phreaking is a set of methods used to manipulate the phone
system. The first phone phreakers were curious about the way the phone system worked.
However, after its initial beginning phone phreaking became a means to protest, impress
friends, and access free phone service.
Three key events fueled the movement known as phone phreaking. One key event
that began phone phreaking was AT&T’s decision to replace human operators with a
computerized system using control tones. Phone phreaking is impossible with human
operators. However, after AT&T replaced human operators with computers, control tones
started being used to route phone calls. Phone phreakers artificially generate these tones to
take over control of the phone system.
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 7
Another key factor was the Vietnam War. Anti-establishment feelings were
growing and the phone phreaks used their abilities to attack the phone company. The more
unpopular the war became the easier it was for phone phreaks to justify the illegal use of
phone company facilities.
The last key factor in the birth of the phone phreak was the rate phone companies
charged for long distance calls. When phone phreaking was in its golden age, long distance
calls were very expensive. This created a condition that Meredith (2003) in the article
“Phone Phreaking,” called the ““Robin Hood Syndrome.” Phone phreaks saw themselves
as noble patriots rather than as thieves.”
Hundreds of switching stations make up the phone system. Thousands of trunk lines
link the switching stations together and the trunk lines carry control signals called master
tones between the switching stations. Switching stations transmit these master tones to
signal the status of a trunk line. For example, a 2600 Hz tone indicates that a trunk line is
currently unused. Therefore, if phone phreaks produce the proper control tones at the
proper time they can cause the telephone system to do their bidding. Different techniques
were discovered by underground engineers either accidently or by calling phone relay
stations posing as linemen.
Joe Engressia, a.k.a. “the whistler,” explained in a documentary entitled The Secret
History of Hacking how he accidentally learned about the telephone systems control tones:
One day I was whistling while talking to my grandmother on the phone when the
line went dead. After repeated trials, I noticed that the phone went dead every time I
whistled this particular tune. I called AT&T labs and an engineer explained to me
how the 2600 Hz. tone works. Continuing to play with this tune, I also learned that
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 8
if I subsequently dialed another number I could call anywhere in the world without
charge. (King, 2002)
Denny Teresi made a new contribution to phone phreaking. He mastered the art of
Social Engineering. Social Engineering was the technique of getting phone company
employees to tell classified information about how the phone company operates. Denny
would pose as a phone company employee to get any routing information he wanted.
Denny Teresi had been phone phreaking for years when he introduced an engineering
student named John Draper to this underground world.
Christine (1995) explains how John Draper became known as “Captain Crunch”
when he stated:
One noted phone phreaker was named “Captain Crunch” after the whistle he
obtained and used from the cereal of the same name (see figure 2 John Draper and
figure 3 Captain Crunch Whistle). The whistle was tuned to 2,600 cycles which,
when blown over a telephone receiver, created just the right pitch to illicitly access
toll-free telephone lines.
Figure 2: John Draper Figure 3: Captain Crunch Whistle
Source: The Secret History of Hacking Source: Jack Worsham’s personal collection
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 9
John Draper, a.k.a. “Captain Crunch,” noticed that phone lines would go dead
whenever he played his whistle. This led him to reading everything he could about how the
phone system works. One day while reading, in the engineering library of the University of
California at Berkeley, he came across an article about the phone system’s control codes.
The article explained how the phone system combines different frequencies to produce
numbers and control codes. The article listed all of the control tones. As the legend goes,
hours after reading the article John Draper had invented the Blue Box (see figure 4: Blue
Box), which reproduced the phone system’s control codes and tones.
Figure 4 Blue Box
Source: Google Images
Steve Wozniak’s interest in phone phreaking began after he read an article in
Esquire magazine entitled “Secrets of the Little Blue Box.” In the documentary The Secret
History of Hacking, Steve Wozniak explained his introduction to phone phreaking:
After I built the blue box, I needed someone to teach me how to use it. I started
searching for John Draper. I called all the underground radio stations until I tracked
him down and got him to agree to meet me at my dorm room at California Berkley.
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business10
I felt like I was about to meet the president. When I met him, I felt like I was talking
to a hero. We proceeded to call the pope. (King, 2002)
Meredith (2003), in the article “Phone Phreaking,” explained the general attitude of
the phreaking subculture in its beginning when he wrote, “Phreaking was a semi-
respectable activity. Among hackers there was a gentleman’s agreement that phreaking was
an intellectual game; a form of exploration was OK, but serious theft of services was
taboo.”
The new popularity of phone phreaking drew the attention of a writer by the name
of Ron Rosenbaum. The subsequent article he wrote, “Secrets of the Little Blue Box,” for
Esquire Magazine, changed phone phreaking forever. In this article, he interviewed a
person named Al Gilbertson, who later admitted that his real name was John Draper. In the
article, he explained how the blue box could give its operator the ability to call a
neighboring phone by routing the call around the world, and the Blue Box was becoming
so popular that he and some friends were all ready filling orders to build Blue Boxes.
The release of the magazine article, “The Secrets of the Little Blue Box,” coupled
with the Vietnam War and the federal surtax on long distance phone calls caused phone
phreaking to become more sinister. The magazine article made phone phreaking more
popular, the Vietnam War and the federal surtax on long distance phones calls fanned the
flames of protest.
Heaton (2000), in the article “Hacker History,” wrote about the general attitude of
the phreaking subculture after it became more menacing:
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business11
The phreaking movement developed a subculture with anti-establishment virtues.
The icon of counter-culture, Abbie Hoffman spread the word about phreaking in his
newsletter Youth International Party Line. “Ma’Bell”, as the phone company was
referred to, was a favorite target. Ripping off the phone company became a protest
for the liberation of technology.
The blue box made stealing telephone service easy, perhaps a little too easy. What
was once a relatively small group of underground engineers became an uncontrollable mob.
So many people were using the blue box to steal long distance telephone access that AT&T
lobbied congress to put an end to phone phreaking. To curb the illegal use of the phone
system the federal government passed Title 18. Title 18 of the United States Code section
1029 which made the use and ownership of phone phreaking boxes illegal.
Rise of the Cracker
The January 1975 issue of Popular Electronics introduced the world to what some
consider the first personal computer, the Altair (see figure 5: Altair 8800). Hobbyists and
phone phreakers at a company named Micro Instrumentation and Telemetry Systems
(MITS) invented the Altair. After the emergence of the Altair, many of the phone phreakers
formed a computer club called Homebrew. At the computer club meetings, people would
share their thoughts and ideas about computers.
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business12
Figure 5: Altair 8800
Source: Google Images
However, not everyone was into sharing. One member of Homebrew, Bill Gates
(see figure 6: Bill Gates), wrote in a letter called “An Open Letter to Hobbyist” and in it he
wrote:
As the majority of hobbyists must be aware, most of you steal your software.
Hardware must be paid for, but software is something to share. Who cares if the
people who worked on it get paid? Most directly, the thing you do is theft. (Shustek,
2006)
Bill Gates’ letter changed many hackers’ standpoint about sharing knowledge. In
addition, Steve Wozniak invented the Apple 1 computer (see figure 7: Apple 1 Computer)
and with friend, Steve Jobs started the company Apple Computer. The competitive side of
computing made it necessary to keep secrets. Since everyone was becoming secretive, no
one would share information. If no one shared information, then there was no reason for the
Homebrew computer club. This led to the dissolving of the Homebrew computer club, but
in its wake, former members had started 23 different computer companies. The hacker was
now an outlaw, and the focus changed from exploration to exploitation. The hacker became
a cracker.
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business13
Figure 6: Bill Gates Figure 7: Apple 1 Computer
Source: Google Images Source: Google Images
Crackers made computer intrusion much more menacing. Crackers turn an honest
attempt to help people to pure destruction. Sending malware like viruses, worms, and
Trojans, led to denial of service attacks, piggy backing, and man-in-the-middle attacks
which were meant to harm without any socially redeeming value. Then the game became
even more serious with monetary schemes like phishing and identity theft. Identity thieves
gain illegal access to networks for the sole purpose of stealing personal information. New
social networking web sites have made identity theft a very lucrative crime. Most of these
web sites have very little security, provide the criminal with plenty of personal information,
and provide the criminal cyber stealth. A recent identify theft crime was solved when the
criminal was caught selling a large number of identities. McMillan (2010), cyber crime
reporter, wrote:
Facebook has identified the hacker named Kirllos who tried to sell 1.5 million
Facebook accounts recently in underground hacking forums. Kirllos was first
spotted by researchers at VeriSign's iDefense group a few weeks after he claimed to
have an unusually large number of Facebook accounts for sale at rock-bottom
prices. According to VeriSign, Kirllos wanted between $25 and $45 per 1,000
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business14
accounts, depending on the quality of the Facebook user's connections. Kirllos
appeared to have sold close to 700,000 accounts.
As the technology of database access progresses so does new cyber crime
opportunities. `Crackers have begun to branch out to even more extreme enterprises.
Specialists like: hack-activists and cyber-terrorists have staked out even more ruthless
territory.
Literature Reviews
The following questionnaire was used to determine the aptness of secondary
articles for scholarly research:
Was the article a book review or editorial?
Was a peer review statement present?
Did the article include references, footnotes, or a bibliography?
Was the article longer than 5 pages?
Did the article report new academic research studies, including methodology
and data analysis?
Did the article give the author’s title, affiliation, and contact information?
Did the article have very few advertisements or images in print or PDF
version?
Was the article relevant?
What is the result of the believing and doubting test?
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business15
Article Summaries
The following articles were used strictly to depict a photo or cartoon art:
Asay, C. (2006, September 7). Daryl Cagle's Professional Cartoonists Index. Retrieved
May 18, 2010, from http://cagle.com/news/EvilEmailHackers/6.asp
Google Apple 1. (n.d.). Retrieved June 1, 2010, from Google Images:
http://www.google.com/imgres?imgurl=http://upload.wikimedia.org/wikipedia/com
mons/b/be/Apple_1_computer.jpg&imgrefurl=http://commons.wikimedia.org/wiki/
File:Apple_1_computer.jpg&h=300&w=400&sz=41&tbnid=dqc07Rx6pVj6aM:&t
bnh=93&tbnw=124&prev=/images%3Fq%3DA
Google Altair 8800. (n.d.). Retrieved June 1, 2010, from Google Images:
http://www.google.com/imgres?imgurl=http://chandrakantha.com/articles/indian_m
usic/filmi_sangeet/media/1975_altair8800.jpg&imgrefurl=http://chandrakantha.com
/articles/indian_music/filmi_sangeet/film_song_1975.html&h=240&w=350&sz=23
&tbnid=gVQyflfr-LgdeM:&t
Google Bill Gates. (n.d.). Retrieved June 1, 2010, from Google Images:
http://www.google.com/imgres?imgurl=http://download.microsoft.com/download/d
/a/1/da1340ec-3833-480b-aa53-
d04c61858979/Bill_Gates.jpg&imgrefurl=http://chinadigitaltimes.net/china/bill-
gates/&h=1181&w=1181&sz=992&tbnid=RZuYA5qTBupA4M:&tbnh=150&tbnw
=150&prev
Google Blue Box. (n.d.). Retrieved June 1, 2010, from Google Images:
http://www.google.com/images?q=blue+box&oe=utf-8&rls=org.mozilla:en-
US:official&client=firefox-a&um=1&ie=UTF-
8&source=univ&ei=WCsJTPC_NcP68Ab44JFs&sa=X&oi=image_result_group&c
t=title&resnum=4&ved=0CDgQsAQwAw.
These previous five articles are used to depict a picture or mood that this paper was
describing and thus was used solely for enhancing the written descriptions.
Christine, B. (1995). Computers under the hack attack. Risk Management, 42(3), 49.
Retrieved May 12, 2010, from ABI/INFORM Global. (Document ID: 5355123).
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business16
This peer-reviewed article has much valuable research for its day. It is very
believable article and valuable at the time of printing. This excellent article has lost value
due to the information being dated.
Devos, J., & Pipan, I.. (2009). The role of IT/IS in combating fraud in the payment card
industry. Journal of Internet Banking and Commerce, 14(3), 1-17. Retrieved May
4, 2010, from ABI/INFORM Global. (Document ID: 1951883981).
This peer reviewed article is very valuable and will become one of the backbone
articles used for researching modern cyber crimes.
Heaton, J. (2000, December 8). Hacker History. Retrieved May 20, 2010, from
http://www.slais.ubc.ca/people/students/student-projects/J_Heaton/
This non-peer-reviewed article is very valuable if used in a very limited fashion.
The article is only used to put early cyber crimes into historical perspective. It would not
be considered scholarly but it is very believable.
King, M. (Producer). (2002). The Secret History of Hacking [Motion picture]. England:
September Films for Channel 4 & TLC.
This documentary is not peer-reviewed but is very valuable because it actually
shows and interviews some of the earliest cyber criminals, cyber investigators, and cyber
crimes.
McMillan, R. (2010, May 13). Facebook IDs hacker who tried to sell 1.5M accounts -
Computerworld. Retrieved May 14, 2010, from
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business17
http://www.computerworld.com/s/article/9176744/Facebook_IDs_hacker_who_trie
d_to_sell_1.5M_accounts?taxonomyId=82
This non-peer-reviewed article had very limited value even though it is very timely.
The article was neither well done nor believable. Things stated as undeniable fact at the
beginning of the article was questioned by the author at the end of the article. This made
the article totally unbelievable and very poorly written.
Meredith, M. (2003, April). Phone Phreaking. Retrieved May 18, 2010, from
http://www.iejs.com/TechnologyandCrime/phone_phreaking.htm
This non-peer-reviewed article had very limited research value. The article was
well written and believable.
Rosenbaum, R. (1971, October). Secrets of the Little Blue Box. Retrieved May 18, 2010,
from http://www.webcrunchers.com/crunch/esq-art.html
This is a non-peer reviewed magazine article that changed the world of cyber crime.
Many people learned how to build blue boxes which took hacking from underground
engineers that wanted to help people to the general public that was more apt to commit
frauds.
Shustek, L. (2006). Homebrew Computer Club Newsletter volume 3, Issue Extract of Bill
Gate's Open Letter to Hobbyists. Retrieved June 1, 2010, from DigiBarn Computer
Museum:
http://www.digibarn.com/collections/newsletters/homebrew/V2_01/gatesletter.html
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business18
This non peer-reviewed article contains a historic document written by Bill Gates.
The letter may be at least partially responsible for launching the software industry as it is
today. The letter is a very important historical document in the history of computers and
cyber crime.
Srivastava, R. (2007). Customer's perception on usage of internet banking. Innovative
Marketing, 3(4), 66-72,137. Retrieved May 4, 2010, from ABI/INFORM Global.
(Document ID: 1533911821).
This article was peer reviewed and was an excellent research article on the general
populations’ perception of internet banking. It shows how internet banking is becoming
more acceptable.
Trigaux, R. (2000). A History of Hacking. St. Petersburg Times. Retrieved May,20 2010,
from http://www.sptimes.com/Hackers/history.hacking.html
This article is non-peer-reviewed newspaper article. It describes the perspective of
the early days of cyber crime.
Research Article Comparisons
The first five articles listed are graphics used to enhance the written descriptions
and have limited scholarly value.
The Christine, B. (1995). Article was very relevant once but shows how dated
material can lose its relevance over time.
Unlike the previous articles, the Devos, J., & Pipan, I.. (2009). Article is peer-
reviewed and very relevant.
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business19
The Heaton, J. (2000) article is not peer-reviewed but is believable. It has very
limited research value and is only being used to place historical perspective to cyber
crimes.
The King, M. (Producer). (2002).documentary shows a balanced depiction of
historical events. It has limited scholarly value but is very believable and very well
produced.
McMillan, R. (2010) news article was very timely but poorly written. It lost
relativity and believeability.
The Meredith, M. (2003) article is non-peer-reviewed and has very limited research
value. It was well written and somewhat believable for historical perspective.
The Rosenbaum, R. (1971) article is non-peer-reviewed but is historic in its effect
on the hacking community.
The Shustek, L. (2006) article is not peer-reviewed but is historically significant to
the cyber crime or computer community.
The Srivastava, R.. (2007).article is peer-reviewed and very scholarly. The article
is very relevant and very believable.
The Trigaux, R. (2000).newspaper article was non-peer-reviewed and has limited
scholarly value. It is only used for its historic perspective.
Research Article Strengths and Weaknesses
It was felt that the first five articles help identify the mood, object, or person being
described and did not need extraordinary research value.
The Christine, B. (1995). Article was very well researched and written its only
weakness is its lost value due to time.
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business20
The Devos, J., & Pipan, I.. (2009). Article was very well researched and written. It
will become a very valuable article for the final project.
The Heaton, J. (2000) article is not peer-reviewed but is well written and very
believable.
The King, M. (Producer). (2002).documentary is not peer reviewed but very
believable. It is very difficult to deny information when the criminals and investigators
agree on historical information.
The McMillan, R. (2010 news article was very timely but poorly written. It has no
scholarly value.
The Meredith, M. (2003) article was not peer-reviewed but was well written and
believable.
The Rosenbaum, R. (1971) article was not-peer-reviewed but very important
historically and should still be used for any academic research on the subject of cyber
crime.
The Shustek, L. (2006) article was not peer-reviewed and is not scholarly but is
historically important containing a letter from Bill Gates.
The Srivastava, R. (2007).article about internet banking will become a keystone
article in the final project. The article is very well written and researched and very
believable.
The Trigaux, R. (2000).article is well written and believable but is non-peer-
reviewed and has limited scholarly value
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business21
Research Field Applications
The research field applications of the first five articles are for identification of the
mood, object, or person only.
The Christine, B. (1995).article would have very limited current research
applications
The Devos, J., & Pipan, I.. (2009).article should be mandatory reading for all
personnel in charge of credit card or identity theft security.
The Heaton, J. (2000) article is used for very limited historical perspective
applications.
The King, M. (Producer). (2002). Documentary could be viewed by anyone that
wants historical perspective of cyber crimes and would need to research criminal
techniques.
The McMillan, R. (2010) news article could be used as an example of how not to
write articles.
The Meredith, M. (2003) article has limited research value. It was used only for its
historical perspective.
The Rosenbaum, R. (1971) article should be reviewed by anyone interested in the
history of cyber crime or would like to have a historical perspective on cyber crime.
The Shustek, L. (2006). article would be important to anyone that wants a historical
perspective on computers, cyber crime, and software development.
The Srivastava, R. (2007).article would be very useful for anyone that is studying
internet banking or network security issues.
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business22
The Trigaux, R. (2000). Article has very limited research value. It is being used
very narrowly to give historic perspective.
Topic Coverage Differences
The topic coverage of the first five articles is for identification of mood, object, or
person only.
The Christine, B. (1995).article was scholarly and very relevant for its day.
The Devos, J., & Pipan, I.. (2009).article focuses on one topic and covers it very
well and very scholarly.
The Heaton, J. (2000) article is not as scholarly as peer \-reviewed articles but is
somewhat relevant due to the type of information covered is not time dependant.
The King, M. (Producer). (2002). Documentary is not peer-reviewed but is
somewhat relevant for historical purposes and it is hard to deny information that criminals
and investigators both agree.
The McMillan, R. (2010) news article must have been rushed and sources and facts
should have been checked thoroughly before publication.
The Meredith, M. (2003) article showed historical perspective and therefore is
timely but limited for any modern cyber crimes.
The Rosenbaum, R. (1971)not peer reviewed but contains important research
information on cyber crime.
The Shustek, L. (2006) article was not peer-reviewed but has important historical
information.
The Srivastava, R. (2007).article is very well researched and is very important in
the research of cyber crimes impact on business.
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business23
The Trigaux, R. (2000).news paper article is not peer-reviewed but was well
written. It has limited scholarly value. It was used only for historic perspective.
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business24
Conclusion
.The more business managers and IT staffs understand cyber crimes and cyber
criminals the more network security personnel will be able to target their security
countermeasures. Should business waste money on cyber hoaxes? Should business waste
money on cyber crimes that do not impact their business type? This project attempts to
measure the real impact of cyber crimes by identifying cyber crime targets and hoaxes.
With any research sources are needed. When examining secondary sources special
care must be taken. Scholarly work must be supported with plenty of sources but these
sources must have integrity, reliability, and validity. The author must generate a test that
all sources must pass before they can be used. Only after passing careful scrutiny is the
supporting reference to be used. Once a document loses integrity it is nearly impossible to
regain.-
Where is the current state of research on cyber crime? Plenty of cyber crime
historical and background information exists. Accurate crime statistics are missing. Many
questions need to be answered such as:
What is the real economic impact cyber crime has on business?
If thousands of credit cards are stolen each year, how much do banks lose
monetarily?
How much money is lost do to identity theft each year?
What is the chances the average person will be a victim of identity theft?
What types of cyber crimes are more common for (different types of
businesses)?
What is the typical impact for each instance of ID theft?
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business25
Should the average person worry about ID theft?
What is the impact of cyber terrorism?
What would be the impact of a cyber war?
What would be the impact on business if cyber terrorist took over a SCADA
system?
How much of cyber crime is real and how much of cyber crime is hype?
The next step is to continue gathering secondary sources to broaden and deepen the
cyber crime research and then to collect primary data through phone interviews, surveys,
and the release of raw data collected by the U.S. Federal Government through the freedom
of information act. Data must be scrutinized to maintain integrity. Many different primary
sources must be used to update, cross-check, and ensure data integrity. Primary source
privacy will be maintained to ensure the best data possible.
At the end of the project businesses will have real qualitative and quantitative data
to design database and network security systems.
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business26
Bibliography
Asay, C. (2006, September 7). Daryl Cagle's Professional Cartoonists Index. Retrieved
May 18, 2010, from http://cagle.com/news/EvilEmailHackers/6.asp.
Christine, B. (1995). Computers under the hack attack. Risk Management, 42(3), 49.
Retrieved May 12, 2010, from ABI/INFORM Global. (Document ID: 5355123)..
Devos, J., & Pipan, I.. (2009). The role of IT/IS in combating fraud in the payment card
industry. Journal of Internet Banking and Commerce, 14(3), 1-17. Retrieved May
4, 2010, from ABI/INFORM Global. (Document ID: 1951883981)..
Google Apple 1. (n.d.). Retrieved June 1, 2010, from Google Images:
http://www.google.com/imgres?imgurl=http://upload.wikimedia.org/wikipedia/com
mons/b/be/Apple_1_computer.jpg&imgrefurl=http://commons.wikimedia.org/wiki/
File:Apple_1_computer.jpg&h=300&w=400&sz=41&tbnid=dqc07Rx6pVj6aM:&t
bnh=93&tbnw=124&prev=/images%3Fq%3DA.
Google Altair 8800. (n.d.). Retrieved June 1, 2010, from Google Images:
http://www.google.com/imgres?imgurl=http://chandrakantha.com/articles/indian_m
usic/filmi_sangeet/media/1975_altair8800.jpg&imgrefurl=http://chandrakantha.com
/articles/indian_music/filmi_sangeet/film_song_1975.html&h=240&w=350&sz=23
&tbnid=gVQyflfr-LgdeM:&t.
Google Bill Gates. (n.d.). Retrieved June 1, 2010, from Google Images:
http://www.google.com/imgres?imgurl=http://download.microsoft.com/download/d
/a/1/da1340ec-3833-480b-aa53-
d04c61858979/Bill_Gates.jpg&imgrefurl=http://chinadigitaltimes.net/china/bill-
gates/&h=1181&w=1181&sz=992&tbnid=RZuYA5qTBupA4M:&tbnh=150&tbnw
=150&prev.
Google Blue Box. (n.d.). Retrieved June 1, 2010, from Google Images:
http://www.google.com/images?q=blue+box&oe=utf-8&rls=org.mozilla:en-
US:official&client=firefox-a&um=1&ie=UTF-
8&source=univ&ei=WCsJTPC_NcP68Ab44JFs&sa=X&oi=image_result_group&c
t=title&resnum=4&ved=0CDgQsAQwAw.
Heaton, J. (2000, December 8). Hacker History. Retrieved May 20, 2010, from
http://www.slais.ubc.ca/people/students/student-projects/J_Heaton/.
King, M. (Producer). (2002). The Secret History of Hacking [Motion picture]. England:
September Films for Channel 4 & TLC.
McMillan, R. (2010, May 13). Facebook IDs hacker who tried to sell 1.5M accounts -
Computerworld. Retrieved May 14, 2010, from
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business27
http://www.computerworld.com/s/article/9176744/Facebook_IDs_hacker_who_trie
d_to_sell_1.5M_accounts?taxonomyId=82.
Meredith, M. (2003, April). Phone Phreaking. Retrieved May 18, 2010, from
http://www.iejs.com/TechnologyandCrime/phone_phreaking.htm.
Rosenbaum, R. (1971, October). Secrets of the Little Blue Box. Retrieved May 18, 2010,
from http://www.webcrunchers.com/crunch/esq-art.html.
Shustek, L. (2006). Extract of Bill Gate's open letter to hobbyists. Homebrew Computer
Club Newsletter volume 3, Issue Retrieved June 1, 2010, from DigidBarn Computer
Museum:
http://www.digibarn.com/collections/newsletters/homebrew/V2_01/gatesletter.html.
Srivastava, R.. (2007). Customer's perception on usage of internet banking. Innovative
Marketing, 3(4), 66-72,137. Retrieved May 4, 2010, from ABI/INFORM Global.
(Document ID: 1533911821).
Trigaux, R. (2000). A history of hacking. St. Petersburg Times. Retrieved May,20 2010,
from http://www.sptimes.com/Hackers/history.hacking.html.
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business28
Annotated Bibliography
Asay, C. (2006, September 7). Daryl Cagle's Professional Cartoonists Index. Retrieved
May 18, 2010, from http://cagle.com/news/EvilEmailHackers/6.asp.
Asay, C. (2006) produced a cartoon depicting different views of how hackers see
themselves and how the public views hackers. It is an excellent example of how a
picture can say a thousand words and how many hackers feels that they are doing
the world a service while the world just views them as thieves. It is good for telling
the IT field that sometimes the view employers and others have of them is different
than they have of themselves. This can be very useful especially to those that are
new to IT. It is not peer-reviewed but depicts feelings that are easily verified and
therefore is still useful for this limited purpose.
Baars, H., & Kemper, H. G. (2008). Management support with structured and unstructured
data and integrated business framework. Information Systems Management, 25(2),
132–148.
Baars, H.(2008) describes the role of how unstructured data can be used to add
granularity to structured data. It also describes possible methods to improve data
mining and data classification. It is an excellent peer-reviewed article concerning
data and how it can be used to improve business intelligence. IT and busine.ss data
managers could use this article to improve their database management systems.
Software engineers could use the improvement methods to design better data
mining systems
Christine, B. (1995). Computers under the hack attack. Risk Management, 42(3), 49.
Retrieved May 12, 2010, from ABI/INFORM Global. (Document ID: 5355123).
Christine, B. (1995). Described hacking techniques and cyber crimes that were
most prominent in 1995. It is a peer-reviewed article that was well researched and
written. It would have been very credible for its day. Since 1995 cyber crimes
have changed and the article has only limited validity for today. It was used in this
paper for a very limited purpose: to describe a very old type of cyber crime that
was appropriate for the dated nature of the material. IT personnel may find it useful
for its historic value but not very pertinent for today.
Devos, J., & Pipan, I.. (2009). The role of IT/IS in combating fraud in the payment card
industry. Journal of Internet Banking and Commerce, 14(3), 1-17. Retrieved May
4, 2010, from ABI/INFORM Global. (Document ID: 1951883981).
Devos, J. (2009) described how IT security techniques could be used to combat card
fraud in the banking industry. It was also an excellent example of how to use
qualitative research methods supplemented with quantitative research to form a
mixed research methodology.-It is a scholarly peer reviewed article that is very
relevant for anyone responsible for combating credit card fraud. It should be
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business29
mandatory reading for all banking and IT security personal that interact with credit
card information. It is a very valuable peer-reviewed article that shows one of
today’s more prevalent cyber crimes. IT personnel that deal with credit card or
identity theft fraud would find this article very important.
Fabian, e. a. (2006). Virtualization in the enterprise. Intell Technology Journal , 10 (3), 227-
242.
Fabian, e. a. (2006). described how virtualization can present network problems.
An internal Intel Technology Journal that is not peer reviewed but has the input of
many experts that are highly respected in networking hardware and software. Many
articles depict virtualization as a win only panacea. This article points out the
virtualization needs to be considered very carefully. It is an excellent article for any
manager or IT staffer that is working for a company that is either considering
network virtualization or has converted to virtualization. One of the most important
articles current present on the topic of virtualization.
Google Apple 1. (n.d.). Retrieved June 1, 2010, from Google Images:
http://www.google.com/imgres?imgurl=http://upload.wikimedia.org/wikipedia/com
mons/b/be/Apple_1_computer.jpg&imgrefurl=http://commons.wikimedia.org/wiki/
File:Apple_1_computer.jpg&h=300&w=400&sz=41&tbnid=dqc07Rx6pVj6aM:&t
bnh=93&tbnw=124&prev=/images%3Fq%3DA.
Google Apple 1. (n.d.). depicts the picture of an Apple 1 computer. It is very useful
for all IT and computer enthusiasts that want to view a piece of computer history.
The original Apple 1 computer is very rare and is largely responsible for launching
the personal PC market. It is not peer-reviewed but is only being using for
identification purposes and if there is no arguments about the likeness it has
fulfilled it intended purpose..
Google Altair 8800. (n.d.). Retrieved June 1, 2010, from Google Images:
http://www.google.com/imgres?imgurl=http://chandrakantha.com/articles/indian_m
usic/filmi_sangeet/media/1975_altair8800.jpg&imgrefurl=http://chandrakantha.com
/articles/indian_music/filmi_sangeet/film_song_1975.html&h=240&w=350&sz=23
&tbnid=gVQyflfr-LgdeM:&t.
Google Altair 8800. (n.d.). depicts the picture of the Altair 8800. It is very useful
for all IT and computer enthusiasts that wan
t to view a piece of computer history. The Altair 8800 is reported by many to be the
first practical personal computer. IT is used merely to identify the appearance of
the Altair 8800. IT personal can experience increased awareness of their profession
by being familiar with its past.
Google Bill Gates. (n.d.). Retrieved June 1, 2010, from Google Images:
http://www.google.com/imgres?imgurl=http://download.microsoft.com/download/d
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business30
/a/1/da1340ec-3833-480b-aa53-
d04c61858979/Bill_Gates.jpg&imgrefurl=http://chinadigitaltimes.net/china/bill-
gates/&h=1181&w=1181&sz=992&tbnid=RZuYA5qTBupA4M:&tbnh=150&tbnw
=150&prev.
Google Bill Gates. (n.d.).depicts the picture of Bill Gates. Bill Gates is considered
by many as a founding father of modern computing. This reference is not peer-
reviewed but is used merely for the limited purpose of identifying Bill Gates. Bill
Gates is largely responsible for how software is marketed and sold today. IT
personel as well as software designers, engineers, and programmers owe, in large
regards, their careers to Bill Gates.
Google Blue Box. (n.d.). Retrieved June 1, 2010, from Google Images:
http://www.google.com/images?q=blue+box&oe=utf-8&rls=org.mozilla:en-
US:official&client=firefox-a&um=1&ie=UTF-
8&source=univ&ei=WCsJTPC_NcP68Ab44JFs&sa=X&oi=image_result_group&c
t=title&resnum=4&ved=0CDgQsAQwAw.
Google Blue Box. (n.d.). depicts the picture of the Blue Box. The blue box was one
of the first hacker tools ever used. IT personnel that wish to understand and get a
greater appreciation for modern hacking techniques would be interested in the
design and development of the blue box. Blue boxes are used today in a very
limited set of circumstances. The chances that an IT person would run across them
in the course of their normal affairs are limited. It is used mostly for its historic
value.
Heaton, J. (2000, December 8). Hacker History. Retrieved May 20, 2010, from
http://www.slais.ubc.ca/people/students/student-projects/J_Heaton/.
Heaton, J. (2000). described the historical perspective of cyber crimes. It is not
peer-reviewed but is valuable if used for limited reasons. The article places the
events of hacking into the context of what was going on in the United States at the
time. IT personnel with an interest in cyber crime history would find the article
valuable for historical perspective. Other than its historical perspective the article
shows very little cyber crime information that is important today.
Hoepfl, M., (n.d.). Choosing qualitative research: A primer for technology Education
Researchers -. Retrieved May 4, 2010, from
http://scholar.lib.vt.edu/ejournals/JTE/v9n1/hoepfl.html.
Hoepfl, M., (n.d.) described how technology research depends too much on
quantitative methods and would benefit from the depth of research that qualitative
research would provide. Used the excellent point that too much data without
context can lead to very dry research results. This is a very valuable peer-reviewed
article for anyone that is conducting research and is deciding on the methodology
they wish to use.
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business31
Jick, T. (1979, December). Mixing qualitative and quantitative methods: Triangulation in
action JSTOR: Administrative Science Quarterly, Vol. 24, No. 4 (Dec., 1979), pp.
602-611.. Retrieved May 6, 2010, from http://www.jstor.org/pss/2392366.
Jick, T. (1979.. described how qualitative and quantitative research methods should
be complementary and not competing. They should form a mixed research method
for best research on a subject. Made the excellent point that using both methods
does not have to mean twice as much work if used in a complementary fashion. A
dated but still very valuable article for anyone conducting research and is trying to
determine the type of methodology they will be using.
King, M. (Producer). (2002). The Secret History of Hacking [Motion picture]. England:
September Films for Channel 4 & TLC.
King, M. (Producer). (2002).this is a documentary depicting the early days of
hacking with many of the original characters. It gains a great deal of its value from
the fact that many of the more infamous persons involved in these early hacking
crimes were interviewed. Many of the tools and techniques as well as historical
perspective was presented. The criminal and investigator’s perspectives were
presented. It would be very valuable for any IT staffer that wishes to understand
the motivations and targets of the early cyber criminal.
McMillan, R. (2010, May 13). Facebook IDs hacker who tried to sell 1.5M accounts -
Computerworld. Retrieved May 14, 2010, from
http://www.computerworld.com/s/article/9176744/Facebook_IDs_hacker_who_trie
d_to_sell_1.5M_accounts?taxonomyId=82.
McMillan, R. (2010,) described the apprehending of a cyber criminal. It was
written for a trade journal and was not peer-reviewed. At first it appears to be a
creditable article but then it questions its own evidence as it soon falls apart. It was
tryintg to cover a very serious criminal but destroyed its own creditablitly. Not a
very useful article.
Meredith, M. (2003, April). Phone Phreaking. Retrieved May 18, 2010, from
http://www.iejs.com/TechnologyandCrime/phone_phreaking.htm.
Meredith, M. (2003)describes the culture of the United States during the sixties
when many anti-establishment forces were influencing early computer hobbyists.
Many people were tired of large long distance phone calls and were looking for
anyway to make free phone calls. It is not peer-reviewed and is only used in a
limited way to depict the mood of the country historically. Anyone interested in the
motivations behind cyber crimes may find the article useful. It has very limited
usefulness in scholarly research.
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business32
Rosenbaum, R. (1971, October). Secrets of the Little Blue Box. Retrieved May 18, 2010,
from http://www.webcrunchers.com/crunch/esq-art.html.
Rosenbaum, R. (1971) describes the origin and construction of the blue box.
Anyone that is researching the history of cyber crime would fined this article
invaluable. It is the article that changed phone phreaking forever. It is reported that
millions read the article and built their own blue boxes. The large number of popel
using blue boxes tipped off AT&T which started investigating, congress passed new
communications laws and many phone phreakers were arrested. This article led to
many people using technology just because they wanted to steal and vandalize.
This led to an entire change in cyber culture. On the other hand, Steve Wozniack
read the article, built his own blue box which started his interest in computing,
which led to the Apple 1.
Shustek, L. (2006). Extract of Bill Gate's open letter to hobbyists. .Homebrew Computer
Club Newsletter bolume 3, Issue Retrieved June 1, 2010, from DigidBarn Computer
Museum:
http://www.digibarn.com/collections/newsletters/homebrew/V2_01/gatesletter.html.
Shustek, L. (2006).describes the early meetings of the Homebrew computer club.
.In the early days after the release of the Altair 8800, many people formed a club to
discuss how to use this early computer. Software was freely given and traded until
one day Bill Gates wrote the infamous “Open Letter” which got many people to
start charging for software. Soon the Apple 1 was released and software and
hardware development became securiit. Anyone interested in the early days of
software development, Microsoft, or Bill Gates would find this article helpful. It is
not peer reviewed and should only be used for very limited scholarly research
purposes.
Srivastava, R.. (2007). Customer's perception on usage of internet banking. Innovative
Marketing, 3(4), 66-72,137. Retrieved May 4, 2010, from ABI/INFORM Global.
(Document ID: 1533911821)..
Srivastava, R.. (2007) described how the perception of internet banking has
changed over the last few years. It is also an excellent example of using qualitative
research methods (surveys and interviews) to conduct research. Researchers would
find this peer-reviewed article valuable as a source that shows how to use
qualitative research to compile data. To truly under4stand the why and how you
need to gather more information than just statistics.
Trigaux, R. (2000). A history of hacking. St. Petersburg Times. Retrieved May,20 2010,
from http://www.sptimes.com/Hackers/history.hacking.html.
Trigaux, R. (2000).describes some early cyber crime events. The article attempts to
show early cyber crimes from the criminal and investigators point of view. The
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business33
article gives the cyber criminal much credit for the beginning of the computer age.
This is a newspaper article that is not peer reviewed and is used only to set historic
perspective. Scholars will find very limited research value.
Trochim, W., & Donnelly, J., (2008). The Research methods knowledge base, 3rd
Edition..
Atomic Dog/Cengage Learning Publshing. Mason, Ohio.
Trochim, W.(2008) described all the major stages of research. It was a very
through treatise on research, data collecting, and data analysis very important form
anyone conducting research. This article ia an invaluable treatise for anyone about
to embark on academic research. It is peer-reviewed, vary creditable, and
invaluable for researchers.