Computer Crimes - Bucknell University

Report
Computer
Crimes
Brandon Besant
Frank DeNick
3 Phases of Hacking
Phase 1 (1960s – early 1970s)




Defined as a person who wrote very elegant or
creative programs. Someone who likes to explore
the details of programmable systems and how to
stretch their capabilities. One who programs
enthusiastically
Used their skills to create some of the first video
games and operating systems
Mostly high school or college kids who hacked out
of curiosity
These hackers wanted to test their own limits and
the limits in place by the software and hardware
designers
Phase 2 (1970s – mid 1990s)








Definition changed throughout this time period. This is the period
where hacking took on its most common meaning used today
New definition: someone who breaks into computer systems in
which the hackers do not have authorization
By the 1980s hackers were in full swing
Prime targets were: government defense systems, university
campus networks and large companies
Started using social engineering techniques: pretending to be
someone that they are not
Started using sniffers
Adults started to catch on to the hacking scene because of
potential of a get rich quick mentality
Countries started to see problems with being able to control the
international crime
Phase 3 (mid 1990s on)





This era marked the growth of the world wide
web and e-commerce
This phase includes all of the above including
new threats
Intricacies to the web and the mass usage
made hacking more dangerous and
damaging and more attractive to criminals
There is a lot more accessible info on the web
New hacking techniques started to surface
What is Hacking?


A hacker is a person who uses creative programming
to break into another computer system that they do
not have access to otherwise
A hacker can be categorized in 5 ways:
1.
2.
3.
4.
5.
Person who enjoys learning details of a programming
language or system
Person who enjoys actually doing the programming
rather than just theorizing about it
Person capable of appreciating someone else’s
hacking
Person who picks up programming quickly
Person who is an expert at a particular programming
language or system
Hacking Activities

Some activities hackers are prevalent at
include:





Intentionally releasing viruses in computer
systems with the intention to cause harm
Steal sensitive personal, business and
government information
Steal money or identity
Crash websites and destroy files
Etc.
http://money.cnn.com/2
011/10/27/technology/rs
a_hack_widespread/ind
ex.htm
Bot-herders
 What
is a bot-herder?
 How does a bot-herder “herd”?

Virus
 E-mail

Worm
 Code

virus
Red worm
Trojan horse
Responsibility?

What responsibilities do companies have
when they fire an employee?

Who is at fault if a hacker compromises
your computer?
Crimes and Mandatory
Sentences











Aggravated sexual assault of a minor: 25 – 50 years
Murder: 25 years
Act of terrorism: 10 years
Home invasion: 10+ years
Sexual assault: 2, 5 or 10 years (depends on conduct
and victims age)
Injury or risk of injury to a minor: 5 years
Importing child pornography or possession: 5 years
Carjacking: 3 years
Selling drugs to minors: 2 years
Kidnapping: 1+ years
Possession of assault weapon: 1 year
Fast Food Hacker
Suspect: Jason Cornish
 Occupation: IT Administrator
 Cost of Damages: $800, 000
 Sentence?
 Was the sentence Jason Cornish fitting for
his crime?

Scenario:
Who should receive a worse
punishment?
 Suspect B:






Suspect A:
Seen as a rogue programmer
Bottlenecked and sabotaged 
projects to make his
colleagues look bad

Was an unpleasant person to
work with

Plotted a plan to create a
program that would
practically destroy the
company when he got word
about his impending release
from the company
Was a great programmer who
used his skills to help the
advancement of the company
Was always willing to help fellow
employees when they had issues
Had employee of the year
qualities and everybody got
along with
Upon his release from the
company due to downsizing,
suspect B created a script that
would cause crippling
consequences to the future of
the companies success and
credibility
What do you see?

What does 64 characters or 6 lines of code = ?
Premeditated Attack!!!
 Suspect:
Timothy Lloyd
 Occupation: IT Administrator
 Cost of Damages: $10 million
 Sentence?
 Was the sentence Timothy Lloyd
fitting for his crime?
Different Perspectives
Is hacking necessarily stealing as it is
borrowing or just copying?
 Can hacking be categorized under theft?
 If there is vital information that may tarnish
ones reputation or career, is hacking
wrong when protecting this reputation or
career? (think deontological theory)

Can Hacking Be A good
Thing?




Mark Zuckerberg considers himself to be a
‘Hacker’
“ It's an ideal that permeates the company's
culture. It explains the push to try new ideas
(even if they fail), and to promote new
products quickly (even if they're imperfect).”
Zuckerberg considers Steve Jobs and Steve
Wozniak to be hackers as well
He continues to write code hours on end
even though he has hundreds to develop
code
Some Thought
 Where
would Facebook be without
hacking?
 How does media affect peoples views on
how society portrays terms like ‘hacker’
Iceman
 Max
2

Ray Butler (aka Max Vision)
million credit card numbers
> $86 million in fraudulent charges
 “White
Hat” hacker
 Carders

Forums
Hacker’s Hacker
Things to keep in mind…
 The
logistics
 Responsibility
 Motives
 Utilitarian

theory
i.e. Master Splyntr and U.S. Secret Service
 Punishments
The Plan
 MSR206
 Is
and The Jerm
it too easy?
Responsibility
 Hijacking
 Arms
WiFi
race
Motives
 What
are Max’s motives?
 Underground
Mainstream
vs.
Victimless Crimes
 An
illegal act that is felt to have no direct
or identifiable victim
 Examples,
 Is
more examples
this a victimless crime?
Ethics
 Utilitarianism

FBI – Master Splyntr

The Secret Service and the mole
Punishments
 Shadowcrew
1

life lost vs. 1,000,000 lives ruined
Can they be compared?
Questions to think about
Is it always morally wrong to create false
web identities?
 Does it depend on the intention, or is it
somehow wrong in itself?
 If this false identity is for the better of many
can it still be ‘right’?

Rights Question
Do people have the right to own
software?
 How would limiting the licensing on
software help improve software
development?

Citations










http://searchsecurity.techtarget.com/definition/hacker
http://www.cracked.com/article_19528_5-true-stories-thatprove-you-shouldnt-piss-off-it-guy_p2.html
http://www.usatoday.com/tech/news/story/2012-0204/facebook-the-hacker-way/52959640/1
http://www.cga.ct.gov/2008/rpt/2008-R-0619.htm
http://www.howstuffworks.com/virus.htm
http://www.wired.com/threatlevel/2009/06/butler_court/
http://www.usatoday.com/tech/news/story/2012-0204/facebook-the-hacker-way/52959640/1
http://www.ldp.org.au/policies/1166-victimless-crimes
http://www.listmyfive.com/4aba2cad/The-Top-FiveVictimless-Crimes
http://www.thefreedictionary.com/victimless+crime

similar documents