Computer Crimes Brandon Besant Frank DeNick 3 Phases of Hacking Phase 1 (1960s – early 1970s) Defined as a person who wrote very elegant or creative programs. Someone who likes to explore the details of programmable systems and how to stretch their capabilities. One who programs enthusiastically Used their skills to create some of the first video games and operating systems Mostly high school or college kids who hacked out of curiosity These hackers wanted to test their own limits and the limits in place by the software and hardware designers Phase 2 (1970s – mid 1990s) Definition changed throughout this time period. This is the period where hacking took on its most common meaning used today New definition: someone who breaks into computer systems in which the hackers do not have authorization By the 1980s hackers were in full swing Prime targets were: government defense systems, university campus networks and large companies Started using social engineering techniques: pretending to be someone that they are not Started using sniffers Adults started to catch on to the hacking scene because of potential of a get rich quick mentality Countries started to see problems with being able to control the international crime Phase 3 (mid 1990s on) This era marked the growth of the world wide web and e-commerce This phase includes all of the above including new threats Intricacies to the web and the mass usage made hacking more dangerous and damaging and more attractive to criminals There is a lot more accessible info on the web New hacking techniques started to surface What is Hacking? A hacker is a person who uses creative programming to break into another computer system that they do not have access to otherwise A hacker can be categorized in 5 ways: 1. 2. 3. 4. 5. Person who enjoys learning details of a programming language or system Person who enjoys actually doing the programming rather than just theorizing about it Person capable of appreciating someone else’s hacking Person who picks up programming quickly Person who is an expert at a particular programming language or system Hacking Activities Some activities hackers are prevalent at include: Intentionally releasing viruses in computer systems with the intention to cause harm Steal sensitive personal, business and government information Steal money or identity Crash websites and destroy files Etc. http://money.cnn.com/2 011/10/27/technology/rs a_hack_widespread/ind ex.htm Bot-herders What is a bot-herder? How does a bot-herder “herd”? Virus E-mail Worm Code virus Red worm Trojan horse Responsibility? What responsibilities do companies have when they fire an employee? Who is at fault if a hacker compromises your computer? Crimes and Mandatory Sentences Aggravated sexual assault of a minor: 25 – 50 years Murder: 25 years Act of terrorism: 10 years Home invasion: 10+ years Sexual assault: 2, 5 or 10 years (depends on conduct and victims age) Injury or risk of injury to a minor: 5 years Importing child pornography or possession: 5 years Carjacking: 3 years Selling drugs to minors: 2 years Kidnapping: 1+ years Possession of assault weapon: 1 year Fast Food Hacker Suspect: Jason Cornish Occupation: IT Administrator Cost of Damages: $800, 000 Sentence? Was the sentence Jason Cornish fitting for his crime? Scenario: Who should receive a worse punishment? Suspect B: Suspect A: Seen as a rogue programmer Bottlenecked and sabotaged projects to make his colleagues look bad Was an unpleasant person to work with Plotted a plan to create a program that would practically destroy the company when he got word about his impending release from the company Was a great programmer who used his skills to help the advancement of the company Was always willing to help fellow employees when they had issues Had employee of the year qualities and everybody got along with Upon his release from the company due to downsizing, suspect B created a script that would cause crippling consequences to the future of the companies success and credibility What do you see? What does 64 characters or 6 lines of code = ? Premeditated Attack!!! Suspect: Timothy Lloyd Occupation: IT Administrator Cost of Damages: $10 million Sentence? Was the sentence Timothy Lloyd fitting for his crime? Different Perspectives Is hacking necessarily stealing as it is borrowing or just copying? Can hacking be categorized under theft? If there is vital information that may tarnish ones reputation or career, is hacking wrong when protecting this reputation or career? (think deontological theory) Can Hacking Be A good Thing? Mark Zuckerberg considers himself to be a ‘Hacker’ “ It's an ideal that permeates the company's culture. It explains the push to try new ideas (even if they fail), and to promote new products quickly (even if they're imperfect).” Zuckerberg considers Steve Jobs and Steve Wozniak to be hackers as well He continues to write code hours on end even though he has hundreds to develop code Some Thought Where would Facebook be without hacking? How does media affect peoples views on how society portrays terms like ‘hacker’ Iceman Max 2 Ray Butler (aka Max Vision) million credit card numbers > $86 million in fraudulent charges “White Hat” hacker Carders Forums Hacker’s Hacker Things to keep in mind… The logistics Responsibility Motives Utilitarian theory i.e. Master Splyntr and U.S. Secret Service Punishments The Plan MSR206 Is and The Jerm it too easy? Responsibility Hijacking Arms WiFi race Motives What are Max’s motives? Underground Mainstream vs. Victimless Crimes An illegal act that is felt to have no direct or identifiable victim Examples, Is more examples this a victimless crime? Ethics Utilitarianism FBI – Master Splyntr The Secret Service and the mole Punishments Shadowcrew 1 life lost vs. 1,000,000 lives ruined Can they be compared? Questions to think about Is it always morally wrong to create false web identities? Does it depend on the intention, or is it somehow wrong in itself? If this false identity is for the better of many can it still be ‘right’? Rights Question Do people have the right to own software? How would limiting the licensing on software help improve software development? Citations http://searchsecurity.techtarget.com/definition/hacker http://www.cracked.com/article_19528_5-true-stories-thatprove-you-shouldnt-piss-off-it-guy_p2.html http://www.usatoday.com/tech/news/story/2012-0204/facebook-the-hacker-way/52959640/1 http://www.cga.ct.gov/2008/rpt/2008-R-0619.htm http://www.howstuffworks.com/virus.htm http://www.wired.com/threatlevel/2009/06/butler_court/ http://www.usatoday.com/tech/news/story/2012-0204/facebook-the-hacker-way/52959640/1 http://www.ldp.org.au/policies/1166-victimless-crimes http://www.listmyfive.com/4aba2cad/The-Top-FiveVictimless-Crimes http://www.thefreedictionary.com/victimless+crime