Crime Chapter 5. Hacking Hacker Trophy hacking Phone phreaking Cracker White-hat hackers & black-hat...

15
Crime Chapter 5

Transcript of Crime Chapter 5. Hacking Hacker Trophy hacking Phone phreaking Cracker White-hat hackers & black-hat...

Crime

Chapter 5

HackingHackerTrophy hackingPhone phreakingCrackerWhite-hat hackers & black-hat hackersScript kiddiesSniffersSocial engineering

Hacking Cases1970s – John Draper (“Captain Crunch”)April 27, 1987 – “Captain Midnight”

Good Evening HBO from Captain Midnight. $12.95 a month? No way! (Show-time/Movie Channel, Beware!)

Late 1980s – “Fry Guy”Russian man & Citicorp1991 – “Michelangelo” virus

Viruses, time bombs, logic bombsGambling web siteAir traffic controllers in England1999 – “Melissa” virus2000 – The “Love Bug” or “ILOVEYOU” virus

Hacking Cases2000 – Mafiaboy

Denial of service attack (DoS); distributed denial of service attack (DDoS); Trojan Horses

10.10.08 PCWorld article: http://www.pcworld.com/businesscenter/article/152176/mafiaboy_grows_up_a_hacker_seeks_redemption.html

2001 – Hacktivism2001 – “Code Red” worm

worm2003 – “Sapphire” worm or “Slammer”2003 – “Blaster” worm2004 – “Sasser” worm2001 – “Choke” & “Hello” worms2008 – Sarah Palin’s email hacked

http://news.yahoo.com/s/ap/20081008/ap_on_el_pr/palin_hacked

FirewallsWindows Firewall – Start, Control Panel,

SecurityMacOS – System Preferences, Personal Security3rd Party Firewalls

Zone Alarm (free version – http://www.zonelabs.com)

PC Magazine page with more info: http://www.pcmag.com/category2/0,2806,4722,00.asp

Top 5: http://www.all-internet-security.com/top_10_firewall_software.html)

First AmendmentSoftware is a form of speech.The First Amendment does not protect

some kinds of speech, such as inciting a riot.

Should virus software on the Web be protected under the First Amendment or should it be considered in the same class as that of inciting a riot?

Virus Code OnlineThe families of two hospital patients that died as the

result of a virus in a hospital computer are suing each of the people listed below and urging the government to bring criminal charges for negligence against each of them:

1.A student in a course on computer security at a small college who posted a copy of the virus program on the class Web site, with a discussion of how it works.

2.The student who activated the virus and released it onto the Internet.

3.The president of the college.4.The president of the college’s ISP.5.The director of the hospital whose computer system

the virus infected, causing the patient medical records to be unavailable for a full day, resulting in the deaths of the two patients.

Identity TheftStolen credit/debit card numbers to

purchase things with or to sellSSN numbers used to open new accountsTake out loans in someone else’s nameRaid the victim’s bank accountPass bad checks

Methods of Identity TheftPhishing

http://www.sonicwall.com/phishing/ VishingPharmingWhalingResumes onlineSSNsDumpster divingMailbox theftPretextingShoulder surfing

Methods of Identity TheftSocial networking sitesFilesharing and peer-to-peer softwareBogus job offersFake sweepstakes or lotteriesHackingLost or stolen propertyWorkers in your homeChanging your addressCopying information from a transactionCredit reportsRFID readers

How the Victim is AffectedMay result in monetary lossesAnguish, disruption of his or her lifeLegal feesLoss of a good credit ratingBe prevented from borrowing money or cashing

checksLose a jobUnable to rent an apartmentSued by creditors to whom the criminal owes

moneyAnd… the authorities are slow to act on your

behalf

How To Protect YourselfDon’t carry checkbook, SSN card, or all your

credit cards with you all the timeKeep your SSN privateShred your credit card offers, etc.Use updated anti-spyware/anti-theft

software on your computerNever give out personal info over the phoneMonitor your credit reportsBe careful of using your credit cards in

restaurants

If You Think You’ve Been a Victim of Identity Theft:1. Police report2. Fraud alert3. Credit freeze

Establishing Good CreditCollege students are targetsChecking accountDepartment store cardsPrepaid cardsCo-signer on applicationshttp://www.annualcreditreport.com http://www.myfico.com

What Are Your Rights?Fair Credit Reporting Act – says that you must be told

what’s in your credit file and have any errors corrected. If you notify the bureau of any error, they have 30 days to resolve the dispute.

Fair Credit Billing Act – creditors are required to promptly credit your payments and correct billing mistakes and you can withhold payments on defective goods. Examples of errors: http://www.federalreserve.gov/pubs/consumerhdbk/aspects.htm

Truth in Lending – this is the 3 day right of rescission that you have to change your mind about certain credit transactions that use your home as collateral, such as on a home equity loan or if you refinance your mortgage with a different lender (but not a mortgage for an original purchase)