Computer CrimesBrandon BesantFrank DeNick
3 Phases of Hacking
Phase 1 (1960s – early 1970s) Defined as a person who wrote very elegant or
creative programs. Someone who likes to explore the details of programmable systems and how to stretch their capabilities. One who programs enthusiastically
Used their skills to create some of the first video games and operating systems
Mostly high school or college kids who hacked out of curiosity
These hackers wanted to test their own limits and the limits in place by the software and hardware designers
Phase 2 (1970s – mid 1990s) Definition changed throughout this time period. This is the period
where hacking took on its most common meaning used today New definition: someone who breaks into computer systems in
which the hackers do not have authorization By the 1980s hackers were in full swing Prime targets were: government defense systems, university
campus networks and large companies Started using social engineering techniques: pretending to be
someone that they are not Started using sniffers Adults started to catch on to the hacking scene because of
potential of a get rich quick mentality Countries started to see problems with being able to control the
international crime
Phase 3 (mid 1990s on) This era marked the growth of the world
wide web and e-commerce This phase includes all of the above
including new threats Intricacies to the web and the mass usage
made hacking more dangerous and damaging and more attractive to criminals
There is a lot more accessible info on the web
New hacking techniques started to surface
What is Hacking? A hacker is a person who uses creative programming to
break into another computer system that they do not have access to otherwise
A hacker can be categorized in 5 ways:
1. Person who enjoys learning details of a programming language or system
2. Person who enjoys actually doing the programming rather than just theorizing about it
3. Person capable of appreciating someone else’s hacking4. Person who picks up programming quickly5. Person who is an expert at a particular programming
language or system
Hacking Activities Some activities hackers are prevalent at
include: Intentionally releasing viruses in
computer systems with the intention to cause harm
Steal sensitive personal, business and government information
Steal money or identity Crash websites and destroy files Etc.
http://money.cnn.com/2011/10/27/technology/rsa_hack_widespread/index.htm
Bot-herders What is a bot-herder? How does a bot-herder “herd”?
Virus E-mail virus
Worm Code Red worm
Trojan horse
Responsibility? What responsibilities do companies
have when they fire an employee?
Who is at fault if a hacker compromises your computer?
Crimes and Mandatory Sentences Aggravated sexual assault of a minor: 25 – 50 years Murder: 25 years Act of terrorism: 10 years Home invasion: 10+ years Sexual assault: 2, 5 or 10 years (depends on conduct and
victims age) Injury or risk of injury to a minor: 5 years Importing child pornography or possession: 5 years Carjacking: 3 years Selling drugs to minors: 2 years Kidnapping: 1+ years Possession of assault weapon: 1 year
Fast Food Hacker Suspect: Jason Cornish Occupation: IT Administrator Cost of Damages: $800, 000 Sentence? Was the sentence Jason Cornish fitting
for his crime?
Scenario:Who should receive a worse punishment? Suspect A: Seen as a rogue programmer Bottlenecked and sabotaged
projects to make his colleagues look bad
Was an unpleasant person to work with
Plotted a plan to create a program that would practically destroy the company when he got word about his impending release from the company
Suspect B: Was a great programmer who
used his skills to help the advancement of the company
Was always willing to help fellow employees when they had issues
Had employee of the year qualities and everybody got along with
Upon his release from the company due to downsizing, suspect B created a script that would cause crippling consequences to the future of the companies success and credibility
What do you see? What does 64 characters or 6 lines of code = ?
Premeditated Attack!!! Suspect: Timothy Lloyd Occupation: IT Administrator Cost of Damages: $10 million Sentence? Was the sentence Timothy Lloyd
fitting for his crime?
Different Perspectives Is hacking necessarily stealing as it is
borrowing or just copying? Can hacking be categorized under theft? If there is vital information that may
tarnish ones reputation or career, is hacking wrong when protecting this reputation or career? (think deontological theory)
Can Hacking Be A good Thing?
Mark Zuckerberg considers himself to be a ‘Hacker’
“ It's an ideal that permeates the company's culture. It explains the push to try new ideas (even if they fail), and to promote new products quickly (even if they're imperfect).”
Zuckerberg considers Steve Jobs and Steve Wozniak to be hackers as well
He continues to write code hours on end even though he has hundreds to develop code
Some Thought Where would Facebook be without
hacking? How does media affect peoples views on
how society portrays terms like ‘hacker’
Iceman
Max Ray Butler (aka Max Vision)
2 million credit card numbers > $86 million in fraudulent charges
“White Hat” hacker Carders Forums
Hacker’s Hacker
Things to keep in mind…
The logistics
Responsibility
Motives
Utilitarian theory
i.e. Master Splyntr and U.S. Secret Service
Punishments
The Plan
MSR206 and The Jerm
Is it too easy?
Responsibility Hijacking WiFi
Arms race
Motives
What are Max’s motives?
Underground vs. Mainstream
Victimless Crimes
An illegal act that is felt to have no
direct or identifiable victim
Examples, more examples
Is this a victimless crime?
Ethics
Utilitarianism
FBI – Master Splyntr The Secret Service and the mole
Punishments Shadowcrew
1 life lost vs. 1,000,000 lives ruined Can they be compared?
Questions to think about Is it always morally wrong to create
false web identities? Does it depend on the intention, or is it
somehow wrong in itself? If this false identity is for the better of
many can it still be ‘right’?
Rights Question Do people have the right to own
software? How would limiting the licensing on
software help improve software development?
Citations http://searchsecurity.techtarget.com/definition/hacker http://
www.cracked.com/article_19528_5-true-stories-that-prove-you-shouldnt-piss-off-it-guy_p2.html
http://www.usatoday.com/tech/news/story/2012-02-04/facebook-the-hacker-way/52959640/1
http://www.cga.ct.gov/2008/rpt/2008-R-0619.htm http://www.howstuffworks.com/virus.htm http://www.wired.com/threatlevel/2009/06/butler_court/ http://
www.usatoday.com/tech/news/story/2012-02-04/facebook-the-hacker-way/52959640/1
http://www.ldp.org.au/policies/1166-victimless-crimes http://
www.listmyfive.com/4aba2cad/The-Top-Five-Victimless-Crimes
http://www.thefreedictionary.com/victimless+crime