Hacking, Cracking, and Hactivism: Chantel Frenette, Roxanna Shinall, & Brooke Walker
Hacking, Cracking, and Hactivism: Chantel Frenette, Roxanna Shinall, & Brooke Walker
Hacking, Cracking, and Hactivism: Chantel Frenette, Roxanna Shinall, & Brooke Walker
Hactivism
Hack definition:
1) an article or project without
constructive end
2) work undertaken on bad
self-advice
3) an entropy booster
4) to produce, or attempt to
produce, a hack
The Hacker Ethic
-Steven Levy
1. Access to computers - and anything which might
teach you something about the way the world
works - should be unlimited and total. Always
yield to the Hands-On imperative!
2. All information should be free.
3. Mistrust authority - promote decentralization.
4. Hackers should be judged by their hacking, not
bogus criteria such as degrees, age, race, or
position.
5. You can create art and beauty on a computer.
6. Computers can change your life for the better.
John Draper aka Cap’n Crunch
History Highlights
• BBSs and hacking groups emerge
including Legion of Doom
• War Games
• Hacker magazines
• CFAA
• The Morris Worm
• Cyberespionage
• Hacker’s Manifesto
History Highlights
• Operation Sundevil
• Kevin Poulsen
• Def Con
• Kevin Mitnick
• AOHell
• Pentagon breakins
• Denial of Service attacks
• DNS Attacks
Kevin Mitnick
Hacking - For Good
Ethical Hacking
“The Best Defense Is A Good Offense.”
• Performed for the sake of “enhancing the performance of a
device or exposing the vulnerabilities of a security system for
the benefit of the system administrator.”
“Open source is a
development method for
software that harnesses
the power of distributed
peer review and
transparency of process.”
Hacktivism
Hacktivism:
• Fusion of hacking and activism.
• The act of hacking or breaking into a computer system,
for a politically or socially motivated purpose.
• The individual who performs an act of hacktivism is said
to be a hacktivist.
• Computer hacking always involves some degree of
infringement on the privacy of others or damage to
computer-based property such as files, web pages or
software.
• The impact of computer hacking varies from simply
being simply invasive and annoying to destructive.
What is Hacking?
• Unauthorized use of computer and network resources.
• “Hacker” originally meant a very gifted programmer.
• Hacking is a felony in the US and most other countries.
• When it is done by request and under a contract
between an ethical hacker and an organization, it is OK!
• The difference is that the ethical hacker has
authorization to probe the target.
• “The number of really gifted hackers in the world is very
small, but there are lots of wannabes…”(-Dr. Charles C.
Palmer, IBM)
Definitions
Hacker: Cracker:
A person who enjoys exploring One who breaks security on a
the details of programmable system. Coined ca. 1985 by
systems and how to stretch hackers in defense against
their capabilities, as opposed journalistic misuse of hacker.
to most users, who prefer to An earlier attempt to establish
learn only the minimum `worm' in this sense around
necessary. 1981--82 on Usenet was
One who programs largely a failure.
enthusiastically (even …though crackers often like to
obsessively) or who enjoys describe themselves as
programming rather than just hackers, most true hackers
theorizing about programming. consider them a separate and
A malicious meddler who tries to lower form of life.
discover sensitive information
by poking around. Hence
`password hacker', `network
hacker'. The correct term for
this sense is cracker.
Who hacks?
• Hackers in Eastern Europe hacked about 1
million credit card numbers from 40 financial
companies in the United States in 2003
alone.
• 64% of companies suffered losses from
hackers’ activities.
• More serious offenders, able to cause
damage to a system, are known as hackers.
Who cracks?
• There are 3 groups of crackers:
• Vandals: hack computer systems for
destruction (deleting files).
• Jokers: the most harmless; hacking systems
and carrying in different sounds, noises, and
visual effects.
• Breakers: professional criminals commit
hacking of computer systems with the purpose
of money theft, industrial or commercial
espionage, and thefts of expensive software.
Laws, Fines, and Penalties
• Hackers, virus and worm writers could get 20 years to
life in federal prison.
• Anyone who uses computers to cause death or bodily
harm, such as bringing down power grids or airport
control centers, can get the maximum sentence.
• The sentence is increased by 25% if they steal
personal information.
• The sentence is increased by 50% if they share the
stolen information.
• If posted on the Internet, sentence is doubled!
Computer Fraud and Abuse Act
Summary of CFAA Compromising Confidentiality Provisions
Offense -Sentence
•Obtaining National Security Information -10 (20) years
•Compromising the Confidentiality of a Computer -1 or 5
•Trespassing in a Government Computer -1 (10)
•Accessing a Computer to Defraud & Obtain Value -5 (10)
•Knowing Transmission and Intentional Damage -10 (20 or life)
•Intentional Access and Reckless Damage -5 (20)
•Intentional Access and Damage -1 (10)
•Trafficking in Passwords -1 (10)
•Extortion Involving Threats to Damage Computer -5 (10)
Computer Fraud and Abuse Act
Original 1986 Act:
1996 Revision: