Sunday, February 21, 2016

CYBER TERRORISM/ INFORMATION WARFARE


Acts that are considered Cyber terrorism and/or information warfare can be separated into four distinct categories; infrastructure attacks, information attacks, technological facilitation, and promotion. To find a proper solution, it is necessary to recognize the organizations that may be vulnerable to each kind of attack and understand what the offenders might hope to gain by infiltrating their systems.
Infrastructure attacks: One of the organizations that are susceptible to this kind of attack is Dominion Virginia Power. Dominion Virginia Power empowered with approximately 18000 employees and serve more than 2.5 million houses with electricity and natural gas. Controlling the remote sensors and maintaining the security is the primary goal of the organization. Proper background check for the insiders along with controlling the remote access is mandatory for the company. The perpetrators might hope to intrude the network of the companies, dismantle the controlled flow of the energy and perhaps damage the electricity lines that could impact millions of people.


Information attacks: Organizations that are susceptible to information attacks are the healthcare industry. There are several kinds of Protected Healthcare Information and Personally Identifiable Information that comes in and out of the health insurance company. Any manipulation of the data content or misuse of the personal information may result in major cases of identity theft, healthcare fraud and severe regulatory issues of the entire health care industry.
Technological facilitation: Companies that are susceptible to technological facilitation are the social media companies such as Facebook, MySpace, LinkedIn, Twitter, etc. Since the social media has played a great role in information relay within seconds, the perpetrators can misuse the platform to communicate the plan of attacks.
Promotion: Social media companies are susceptible to promotion along with the technological facilitation. Since, the creation of the social media pages such as Facebook pages are free, perpetrators can create the pages and use that for recruiting, solicitation and fundraising.

References

McLain, J. (2011, April 07). Photo Credit: Cyber Terrorism. Retrieved February 19, 2016, from SlideShare: http://www.slideshare.net/jessicafay2010/cyber-terrorism-power-point
WebRing Inc. (2014, n.d n.d). The World of Information Warfare. Retrieved February 19, 2016, from WebRing Inc: http://www.webring.org/hub?ring=infowar;id=18;prvw




Sunday, February 14, 2016

HACKERS AND THEIR ROLE IN DIGITAL CRIME


      During my previous post, I have provided information on the different categories of cyber crime. This post will exhibit the role of hacker in the digital crime. The term hacker is vague to define. Over the years social media has come up with different terms to define hackers. When we say the word “hacker” there are different thoughts that comes into our mind. People have diverse ways to define hacker depending on who that is and what kind of perception they have over them. So who are these Hackers?
     “Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle of their choice, is called a hacker”. Hackers are master programmers who are skillful in machine code and computer operating systems. Hacking is used to gain unauthorized access into the data system. It is a technical effort to maneuver the normal performance of network connections and connected systems and any person who is engaged in this is a hacker. Hacking does not include computer alone, a hacker can hack into phones, servers and websites.
       There is a unique relationship between hacker and technology. Their deep connection between the computer and technology plays a significant role in their interests and actions. “Hackers are part of a subculture that is constantly in flux, making it very resistant to mainstream culture. It is based on the collecting and sharing of information amongst other hackers in order to find easier solutions to problems within the computer world”. Many hackers develop an interest in technology before or when they are adolescent. Hackers have deep connection with computers and the technology and are driven by increasing knowledge over how computers function and how they can be manipulated. Their identity is built upon their dedication to learn and understand the technology.
    



Hacking itself is not a crime and in several cases hacking might be perfectly legal, but it becomes a crime or illegal when it is done without an authorization. “A digital crime is most generally defined as any criminal act when the perpetrator hacks or breaks into a computer or computer network in order to illegally obtain sensitive information or disseminate destructive computer software”. Although hacking could be legal or illegal those that are illegal have come to controversies because of them being socially acceptable. Edward Snowden could be considered an example. Snowden’s hacking was considered illegal because he did this without the authorization but to many it was socially acceptable because his illegal hacking made all people aware that their government was doing surveillance on its own citizens when the 4th and 5th Amendment of the Constitution, Article 12 of the Universal Declaration of Human Rights forbids such systems of massive, pervasive surveillance. Sometimes hacking could be perfectly legal and socially acceptable as well. For example, when the government some how finds out about gruesome details on future terrorist attack and authorizes a hacker to hack in to the terrorist’s computer to get any details on the attack so they could stop it from happening. Here it would be perfectly legal because the hacker received an authorization and it would be socially acceptable because people would be open towards a hacking that would stop a terrorist attack.
Many hackers develop an interest in technology before or when they are adolescent. Hackers have deep connection with computers and the technology and are driven by increasing knowledge over how computers function and how they can be manipulated. Their identity is built upon their dedication to learn and understand the technology. Hacker’s commitment level can be seen through what category the hacker belongs to. There are three different types of hackers: black hat, white hat and grey hat.
Black Hat- A Black Hat hacker is basically a “malicious” hacker. These hackers are basically considered bad. They create viruses so they can harm people’s computer, hack into people’s mail or bank accounts and gain profit with it. Their basic motivation is to gain profit off it and it does not matter to them if the profit is from doing something illegal.
White Hat- A White Hate hacker is “ethical” hacker. White Hat hacker does not exploit their expertise, but rater use it for a good purpose. They do software testing by manufactures; develop antivirus, independent verification of software function and security. Their motivation is to get better at what they do and create something that would help other people and go further with the technology.
Grey Hat- A Gray Hat hacker is basically a hacker that acts ethically most of the time but sometimes violates accepted ethics. They are recreational hacker or they might violate the ethical code for some profit. For example, they could just out of curiosity hack into their bosses bank account to check how much money he/she has but not do anything wrong with the account. Another example could be a husband paying the hacker to hack into the wife’s email and bank account to check if she is having an affair with another man. The hacker here is using his talent to gain monetary profit.

References

Corporate Author. (2013, n.d n.d). Is hacking considered a cyber crime? Retrieved February 12, 2016, from whocanisue: http://cybercrime-defense.whocanisue.com/hacking-considered-cyber-crime/
Corporate Author. (n.d.). Hacking. Retrieved February 12, 2016, from what is hacking: http://whatishacking.org/
Douglas, T. (n.d, n.d n.d). Hacker as Subculture. Retrieved February 12, 2016, from Wordpress: http://sincdav.wordpress.com/2012/02/10/hacker-as-subculture/
ON LLC. (2015, n.d n.d). How to Protect your Gmail Account: Inside The Mind of A Hacker. Retrieved February 12, 2016, from ON LLC: http://blog.on.com/how-to-protect-your-gmail-account-inside-the-mind-of-a-hacker/
SecPoint. (2015, n.d n.d). Types of Hacker. Retrieved February 12 2016, from SecPoint IT Security Resources: https://www.secpoint.com/types-of-hacker.html
Smith, M. (2015, November 08). Photo Credit: Teen hackers strike again, allegedly gain access to U.S. arrest records database. Retrieved February 12, 2016, from Network World: http://www.networkworld.com/article/3002622/security/teen-hackers-strike-again-allegedly-gain-access-to-us-arrest-records-database.html