SlideShare a Scribd company logo
1 of 34
Death or Glory



DiAmante Astillero
Shannon Bona
John LoCasio               VSB 2006-008
Marcelo Mazzocato          December 6, 2011
A person who enjoys exploring
 High Tech of programmable
  the details  Super Spy?
  systems andor to stretch
               how
    their capabilities, as
Tech Savvy Anti-Social
  opposed to most users, who
            Teen?
   prefer to learn only the
       minimum necessary.
ATTITUDE
•Thrill
                         SKILLS
•“Moral Obligation”
                  •Programming
•Boredom
                  •Write HTMLs
•Freedom
                  •Use and run a Unix
      PERSONAL PREFERENCES
     •Science Fiction
     •Meditation
     •Martial Arts
•Writing open-source software

•Testing and debugging open-
source software

•Keeping the infrastructure
working
THE GLIDER from John
Conway’s Game of Life
Hacker       Cracker



AKA “WHITE HAT”   AKA “BLACK HAT”
     •Builds          •Destroys
    •Helpful         •Malicious
1932- Polish
Cryptologist Broke
the Enigma Machine
   -Enabled the allies
   to read substantial
   amounts of Morse Code
                                   Marian Rejewski

   -Dwight D. Eisenhower
   considered this hack
   “decisive” in the
   Allied victory in
   WWII

                           Henryk Zygalski   Jerzy Rozycki
1971- John T. Draper (Captain
  Crunch) hacks AT&T’s long
  distance calling system

 Used the toy whistle
 found in Cap n’ Crunch
 cereal to generate a 2600
 hertz signal allowing him
 to make free long
 distance calls


                             John T. Draper (Captain Crunch)
1983 - the group
                              KILOBAUD is
                              formed
                              First Hacker
                              group publically
                              acknowledged
                              Kick started the
                              creation of
                              various groups
                                 The 414’s
                                 Legion of Doom
                                 Masters of
Neal Patrick of The 414’s        Deception
The late 80’s were
        plagued with many worms

                    1986- Congress
                      passes the
                      Computer Fraud and
                      Abuse Act
                         Arrest of Lloyd
                         Blankenship aka
                         “The Mentor”
                            Author of The
                            Hacker Manifesto
Lloyd Blankenship
Free Software           vs.     Open Source

-The Freedom to…               -The Freedom to…
  …run the program for any       …redistribute copies for
  purpose                        your neighbors
  …study how it works, and       …make changes
  change it to do what you     -Also includes source
  want                           codes
  …redistribute copies for     -Includes licenses
  your neighbor                  protecting the integrity
  …redistribute copies           of the code’s author
  including your changes
  to your neighbor
June 2002- The Bush
  Administration files a
  bill to create The
  Department of Homeland
  Security
      Responsible for
      protecting the
      nations critical
      IT infrastructure
2011
  April 17th: PlayStation network is hacked
  The Hacker Groups, Lulz Security and
   LulzRaft are formed
  September: Bangladesh hacker “Tiger-
   M@te” infiltrates 700,000 websites in
   one shot
  October 26th: Sesame street channel on
   YouTube was hacked for 22 minutes
  November 1st: Palestinian territory phone
   and internet networks are hacked
CLAIM TO FAME: KIIS-FM Radio
               Station Contest
MOTIVE: Fun and
Curiosity  Criminal
Exploits and
Espionage

TARGETS: Radio Station,
High Profile Government
Systems
EARLY LIFE: Consultant at the
            Pentagon
  White Hat by Day… Black Hat by
              Night
CRIMES: -Win A Porsche by
          Friday Contest
       -Wiretapped Celebrities
       -Cracked Military Computer
            Discovered FBI
            investigation of former
            Philippines President
            Fernidad Marcos
Penalty: -4 year sentence
         -$56,000 restitution
         -Restricted from computer
          for 3 years

Further
Thoughts…
 Is it worth it? More Likely
 than not, Poulsen wasn’t going
 to use the information he
 extracted from the FBI. Is
 personal satisfaction worth 4
 years of one’s life?
“Well, it's power at your
          fingertips. You can control all
                   1st Juvenile
CLAIM TO FAME:computers from the sent to
          these
                   prison for hacking
          government, from the military,
          from large corporations. And if
MOTIVE: Sense of Power doing, you
          you know what you're
          can travel through the internet at
          your will, with no restrictions.
TARGET: -US Department powerDefense
          That's power; it's a of trip”
                        -School Systems
                        -NASA
Implications: -US Security Breach
                  -NASA forced to shut
  “I certainly learned that there's a
                    down computers
  serious lack of computer security. If
  there's a will, there's a way, and if a
                    $40,000 in damages
  computer enthusiast such as myself was
  determined to get into anywhere, be it
CRIMES: -$1.7 Microsoft, it's been from
  the Pentagon or
                   million stolen
            NASA
  demonstrated that it's possible and they
  will do it. And there's intrusions to
           -Series of next to nothing
  they can do about it, because there's
            school systems
  people with skill out there, and they'll
  get what -Created a backdoor in
           they want.”
           DTRA
              Accessed sensitive emails,
              usernames and passwords
PENALTY: 6 months in
         Juvenile Detention


FURTHER
THOUGHTS…
      In a Post 9/11 world, would
      James receive the same
      sentencing?
Claim to Fame: Received
longest sentence for
cyber crime
TARGETS:-ATMS
        -Credit Card
         holders
             IMPLICATIONS: Millions
             of victims globally
            PENALTY: Serving time
                     until 2025
2004 – - Caught “Cashing
               Installed Operation
         2003 Sentenced Moderator on
       2011 – 2000’s – to Two
        Early – Arrested after
          2008
       Firewall: Tookto be an Informant
                       Down “Shadow
       2007 – & Under year terms
         Out” Ceased Surveillance
                 Had Millions of
       Concurrent 20
        shadowcrew.com
          being
       Crew”
         Credit Card Data

2000         2003     2006      2009   2011

       Meanwhile Prosecution, asked
       To Avoid Obtained over 40
       million Credit Card Data
       to become an informant
“As a leader? Unparalleled. Unparalleled in his ability to
coordinate contacts and continents and expertise. Unparalleled
in that he didn’t just get a hack done — he got a hack done, he
 got the exfiltration of the data done, he got the laundering of
           the funds done. He was a five-tool player.”
       –Seth Kosto, Assistant U.S. Attorney (New Jersey)

Further
Thoughts…
Gonzalez not only betrayed the FBI who
gave him a job instead of jail time, but
also the Black Hat Community.
However, hackers such as Jonathan James
still were willing to collaborate with
him. What are your thoughts on the
relationships in the Black Hat Community?
Kevin Poulsen     Senior Editor of
     “Dark Dante”   Wired Magazine



                    Committed
Jonathan James      Suicide in 2008
     “c0mrade”




Albert Gonzalez
An Inner Look at the Authorities’ Responses
      “Tagging a damage amount or number of machines
    compromised to a single virus (let alone a single
   person) is very difficult. Data can be transmitted
       across the globe in a matter of seconds, and
  computers are infected with malware just as quickly.
      As a result, accurately counting the number of
  machines infected by a particular worm is impossible
                and can only be estimated.”
         -Nicholas Newman, National White Collar Crime Center


LOCAL CASES
  •BANK / ATM FRAUD
  •FICTIOUS EMPLOYEE
  •HOTEL / REWARDS
Other Notable Names…
FRED COHEN               1st Virus


ROBERT T MORRIS        1st Worm
                       (Internet Virus)



SHAWN FANNING
Definition
   Open source software is
   software whose source code is
   published and made available
   to the public, enabling anyone
   to copy, modify and
   redistribute the source code

Problems with Open Source Code
   Problem with stopping
    hacking
   Reputational Technology
      Symantec
   Firewalls
   Company Security Policies
   Mobile Device Hacking
      Apple vs. Android
   Bio-hacking
   Advanced Malware
   Combined Technology Hacking

What direction do you see hacking going
in the future? Think about both the
“Black Hat” and “White Hat” Communities.
Death or Glory: The Future of Hacking
Death or Glory: The Future of Hacking
Death or Glory: The Future of Hacking

More Related Content

What's hot

Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hackeryanizaki
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Projecttsdikshit
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminalsOnline
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 

What's hot (19)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Unit 2
Unit 2Unit 2
Unit 2
 
Hacking
Hacking Hacking
Hacking
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Hacking
HackingHacking
Hacking
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 

Viewers also liked

переплетчик Opus metalbind mb300
переплетчик Opus metalbind mb300переплетчик Opus metalbind mb300
переплетчик Opus metalbind mb300politeh36
 
If i hadmylifetoliveover
If i hadmylifetoliveoverIf i hadmylifetoliveover
If i hadmylifetoliveoveramy_seah
 
信誼基金會與小丑 兔子魔術師
信誼基金會與小丑 兔子魔術師信誼基金會與小丑 兔子魔術師
信誼基金會與小丑 兔子魔術師497120364
 
For Growing Height
For Growing HeightFor Growing Height
For Growing Heightmannheimag
 
About Adrian, Delia and Rudy Bautista
About Adrian, Delia and Rudy BautistaAbout Adrian, Delia and Rudy Bautista
About Adrian, Delia and Rudy Bautistarudyabaut
 
Sense Intro
Sense IntroSense Intro
Sense IntroSense
 
Houlihan Smith Asset Manager Brochure
Houlihan Smith   Asset Manager BrochureHoulihan Smith   Asset Manager Brochure
Houlihan Smith Asset Manager Brochurenyates
 
Design Patterns in PHP
Design Patterns in PHPDesign Patterns in PHP
Design Patterns in PHPBiju T
 
Mentor training part 1
Mentor training part 1Mentor training part 1
Mentor training part 1somegaveup
 
Annual Performance Review (2014) o f light hospital sankore
Annual Performance Review (2014) o f light hospital sankoreAnnual Performance Review (2014) o f light hospital sankore
Annual Performance Review (2014) o f light hospital sankorefoli ernest kwasi
 
Accounting and information systems
Accounting and information systemsAccounting and information systems
Accounting and information systemsMyAssignmenthelp.com
 
The swimming
The swimmingThe swimming
The swimmingpaola
 
Değişim zordur, Executive Excellence dergisindendir.
Değişim zordur, Executive Excellence dergisindendir.Değişim zordur, Executive Excellence dergisindendir.
Değişim zordur, Executive Excellence dergisindendir.Utkan Uluçay, MSc., CDDP
 
Scrivere un cv (in sintesi...)
Scrivere un cv (in sintesi...)Scrivere un cv (in sintesi...)
Scrivere un cv (in sintesi...)Alessandro Fortis
 

Viewers also liked (20)

переплетчик Opus metalbind mb300
переплетчик Opus metalbind mb300переплетчик Opus metalbind mb300
переплетчик Opus metalbind mb300
 
If i hadmylifetoliveover
If i hadmylifetoliveoverIf i hadmylifetoliveover
If i hadmylifetoliveover
 
信誼基金會與小丑 兔子魔術師
信誼基金會與小丑 兔子魔術師信誼基金會與小丑 兔子魔術師
信誼基金會與小丑 兔子魔術師
 
For Growing Height
For Growing HeightFor Growing Height
For Growing Height
 
About Adrian, Delia and Rudy Bautista
About Adrian, Delia and Rudy BautistaAbout Adrian, Delia and Rudy Bautista
About Adrian, Delia and Rudy Bautista
 
Sense Intro
Sense IntroSense Intro
Sense Intro
 
Houlihan Smith Asset Manager Brochure
Houlihan Smith   Asset Manager BrochureHoulihan Smith   Asset Manager Brochure
Houlihan Smith Asset Manager Brochure
 
Design Patterns in PHP
Design Patterns in PHPDesign Patterns in PHP
Design Patterns in PHP
 
Mentor training part 1
Mentor training part 1Mentor training part 1
Mentor training part 1
 
Top 10-social-media-mistakes
Top 10-social-media-mistakesTop 10-social-media-mistakes
Top 10-social-media-mistakes
 
Annual Performance Review (2014) o f light hospital sankore
Annual Performance Review (2014) o f light hospital sankoreAnnual Performance Review (2014) o f light hospital sankore
Annual Performance Review (2014) o f light hospital sankore
 
İş kanunu
İş kanunuİş kanunu
İş kanunu
 
Hakers y krakers
Hakers y krakersHakers y krakers
Hakers y krakers
 
Test2
Test2Test2
Test2
 
Accounting and information systems
Accounting and information systemsAccounting and information systems
Accounting and information systems
 
E twinning
E twinningE twinning
E twinning
 
Korris national map corps
Korris national map corpsKorris national map corps
Korris national map corps
 
The swimming
The swimmingThe swimming
The swimming
 
Değişim zordur, Executive Excellence dergisindendir.
Değişim zordur, Executive Excellence dergisindendir.Değişim zordur, Executive Excellence dergisindendir.
Değişim zordur, Executive Excellence dergisindendir.
 
Scrivere un cv (in sintesi...)
Scrivere un cv (in sintesi...)Scrivere un cv (in sintesi...)
Scrivere un cv (in sintesi...)
 

Similar to Death or Glory: The Future of Hacking

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?Jerric Lyns John
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lectureRob Jewitt
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lectureRob Jewitt
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and HackersFarwa Ansari
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lectureRob Jewitt
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all timePRESENTATIONSFORESL
 

Similar to Death or Glory: The Future of Hacking (20)

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
 
Hacking and Hackers
Hacking and HackersHacking and Hackers
Hacking and Hackers
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lecture
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Unit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimesUnit ii-hackers and cyber crimes
Unit ii-hackers and cyber crimes
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Hacking
HackingHacking
Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Top 10 most famous hackers of all time
Top 10 most famous hackers of all timeTop 10 most famous hackers of all time
Top 10 most famous hackers of all time
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
Kraken '16 It quiz final
Kraken '16 It quiz finalKraken '16 It quiz final
Kraken '16 It quiz final
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Death or Glory: The Future of Hacking

  • 1. Death or Glory DiAmante Astillero Shannon Bona John LoCasio VSB 2006-008 Marcelo Mazzocato December 6, 2011
  • 2.
  • 3. A person who enjoys exploring High Tech of programmable the details Super Spy? systems andor to stretch how their capabilities, as Tech Savvy Anti-Social opposed to most users, who Teen? prefer to learn only the minimum necessary.
  • 4. ATTITUDE •Thrill SKILLS •“Moral Obligation” •Programming •Boredom •Write HTMLs •Freedom •Use and run a Unix PERSONAL PREFERENCES •Science Fiction •Meditation •Martial Arts
  • 5. •Writing open-source software •Testing and debugging open- source software •Keeping the infrastructure working
  • 6. THE GLIDER from John Conway’s Game of Life
  • 7. Hacker Cracker AKA “WHITE HAT” AKA “BLACK HAT” •Builds •Destroys •Helpful •Malicious
  • 8.
  • 9. 1932- Polish Cryptologist Broke the Enigma Machine -Enabled the allies to read substantial amounts of Morse Code Marian Rejewski -Dwight D. Eisenhower considered this hack “decisive” in the Allied victory in WWII Henryk Zygalski Jerzy Rozycki
  • 10. 1971- John T. Draper (Captain Crunch) hacks AT&T’s long distance calling system Used the toy whistle found in Cap n’ Crunch cereal to generate a 2600 hertz signal allowing him to make free long distance calls John T. Draper (Captain Crunch)
  • 11. 1983 - the group KILOBAUD is formed First Hacker group publically acknowledged Kick started the creation of various groups The 414’s Legion of Doom Masters of Neal Patrick of The 414’s Deception
  • 12. The late 80’s were plagued with many worms 1986- Congress passes the Computer Fraud and Abuse Act Arrest of Lloyd Blankenship aka “The Mentor” Author of The Hacker Manifesto Lloyd Blankenship
  • 13. Free Software vs. Open Source -The Freedom to… -The Freedom to… …run the program for any …redistribute copies for purpose your neighbors …study how it works, and …make changes change it to do what you -Also includes source want codes …redistribute copies for -Includes licenses your neighbor protecting the integrity …redistribute copies of the code’s author including your changes to your neighbor
  • 14. June 2002- The Bush Administration files a bill to create The Department of Homeland Security Responsible for protecting the nations critical IT infrastructure
  • 15. 2011  April 17th: PlayStation network is hacked  The Hacker Groups, Lulz Security and LulzRaft are formed  September: Bangladesh hacker “Tiger- M@te” infiltrates 700,000 websites in one shot  October 26th: Sesame street channel on YouTube was hacked for 22 minutes  November 1st: Palestinian territory phone and internet networks are hacked
  • 16.
  • 17. CLAIM TO FAME: KIIS-FM Radio Station Contest MOTIVE: Fun and Curiosity  Criminal Exploits and Espionage TARGETS: Radio Station, High Profile Government Systems
  • 18. EARLY LIFE: Consultant at the Pentagon White Hat by Day… Black Hat by Night CRIMES: -Win A Porsche by Friday Contest -Wiretapped Celebrities -Cracked Military Computer Discovered FBI investigation of former Philippines President Fernidad Marcos
  • 19. Penalty: -4 year sentence -$56,000 restitution -Restricted from computer for 3 years Further Thoughts… Is it worth it? More Likely than not, Poulsen wasn’t going to use the information he extracted from the FBI. Is personal satisfaction worth 4 years of one’s life?
  • 20. “Well, it's power at your fingertips. You can control all 1st Juvenile CLAIM TO FAME:computers from the sent to these prison for hacking government, from the military, from large corporations. And if MOTIVE: Sense of Power doing, you you know what you're can travel through the internet at your will, with no restrictions. TARGET: -US Department powerDefense That's power; it's a of trip” -School Systems -NASA
  • 21. Implications: -US Security Breach -NASA forced to shut “I certainly learned that there's a down computers serious lack of computer security. If there's a will, there's a way, and if a $40,000 in damages computer enthusiast such as myself was determined to get into anywhere, be it CRIMES: -$1.7 Microsoft, it's been from the Pentagon or million stolen NASA demonstrated that it's possible and they will do it. And there's intrusions to -Series of next to nothing they can do about it, because there's school systems people with skill out there, and they'll get what -Created a backdoor in they want.” DTRA Accessed sensitive emails, usernames and passwords
  • 22. PENALTY: 6 months in Juvenile Detention FURTHER THOUGHTS… In a Post 9/11 world, would James receive the same sentencing?
  • 23. Claim to Fame: Received longest sentence for cyber crime TARGETS:-ATMS -Credit Card holders IMPLICATIONS: Millions of victims globally PENALTY: Serving time until 2025
  • 24. 2004 – - Caught “Cashing Installed Operation 2003 Sentenced Moderator on 2011 – 2000’s – to Two Early – Arrested after 2008 Firewall: Tookto be an Informant Down “Shadow 2007 – & Under year terms Out” Ceased Surveillance Had Millions of Concurrent 20 shadowcrew.com being Crew” Credit Card Data 2000 2003 2006 2009 2011 Meanwhile Prosecution, asked To Avoid Obtained over 40 million Credit Card Data to become an informant
  • 25. “As a leader? Unparalleled. Unparalleled in his ability to coordinate contacts and continents and expertise. Unparalleled in that he didn’t just get a hack done — he got a hack done, he got the exfiltration of the data done, he got the laundering of the funds done. He was a five-tool player.” –Seth Kosto, Assistant U.S. Attorney (New Jersey) Further Thoughts… Gonzalez not only betrayed the FBI who gave him a job instead of jail time, but also the Black Hat Community. However, hackers such as Jonathan James still were willing to collaborate with him. What are your thoughts on the relationships in the Black Hat Community?
  • 26. Kevin Poulsen Senior Editor of “Dark Dante” Wired Magazine Committed Jonathan James Suicide in 2008 “c0mrade” Albert Gonzalez
  • 27. An Inner Look at the Authorities’ Responses “Tagging a damage amount or number of machines compromised to a single virus (let alone a single person) is very difficult. Data can be transmitted across the globe in a matter of seconds, and computers are infected with malware just as quickly. As a result, accurately counting the number of machines infected by a particular worm is impossible and can only be estimated.” -Nicholas Newman, National White Collar Crime Center LOCAL CASES •BANK / ATM FRAUD •FICTIOUS EMPLOYEE •HOTEL / REWARDS
  • 28. Other Notable Names… FRED COHEN 1st Virus ROBERT T MORRIS 1st Worm (Internet Virus) SHAWN FANNING
  • 29. Definition Open source software is software whose source code is published and made available to the public, enabling anyone to copy, modify and redistribute the source code Problems with Open Source Code
  • 30. Problem with stopping hacking  Reputational Technology Symantec  Firewalls  Company Security Policies
  • 31. Mobile Device Hacking Apple vs. Android  Bio-hacking  Advanced Malware  Combined Technology Hacking What direction do you see hacking going in the future? Think about both the “Black Hat” and “White Hat” Communities.