Death or Glory



DiAmante Astillero
Shannon Bona
John LoCasio               VSB 2006-008
Marcelo Mazzocato          December 6, 2011
A person who enjoys exploring
 High Tech of programmable
  the details  Super Spy?
  systems andor to stretch
               how
    their capabilities, as
Tech Savvy Anti-Social
  opposed to most users, who
            Teen?
   prefer to learn only the
       minimum necessary.
ATTITUDE
•Thrill
                         SKILLS
•“Moral Obligation”
                  •Programming
•Boredom
                  •Write HTMLs
•Freedom
                  •Use and run a Unix
      PERSONAL PREFERENCES
     •Science Fiction
     •Meditation
     •Martial Arts
•Writing open-source software

•Testing and debugging open-
source software

•Keeping the infrastructure
working
THE GLIDER from John
Conway’s Game of Life
Hacker       Cracker



AKA “WHITE HAT”   AKA “BLACK HAT”
     •Builds          •Destroys
    •Helpful         •Malicious
1932- Polish
Cryptologist Broke
the Enigma Machine
   -Enabled the allies
   to read substantial
   amounts of Morse Code
                                   Marian Rejewski

   -Dwight D. Eisenhower
   considered this hack
   “decisive” in the
   Allied victory in
   WWII

                           Henryk Zygalski   Jerzy Rozycki
1971- John T. Draper (Captain
  Crunch) hacks AT&T’s long
  distance calling system

 Used the toy whistle
 found in Cap n’ Crunch
 cereal to generate a 2600
 hertz signal allowing him
 to make free long
 distance calls


                             John T. Draper (Captain Crunch)
1983 - the group
                              KILOBAUD is
                              formed
                              First Hacker
                              group publically
                              acknowledged
                              Kick started the
                              creation of
                              various groups
                                 The 414’s
                                 Legion of Doom
                                 Masters of
Neal Patrick of The 414’s        Deception
The late 80’s were
        plagued with many worms

                    1986- Congress
                      passes the
                      Computer Fraud and
                      Abuse Act
                         Arrest of Lloyd
                         Blankenship aka
                         “The Mentor”
                            Author of The
                            Hacker Manifesto
Lloyd Blankenship
Free Software           vs.     Open Source

-The Freedom to…               -The Freedom to…
  …run the program for any       …redistribute copies for
  purpose                        your neighbors
  …study how it works, and       …make changes
  change it to do what you     -Also includes source
  want                           codes
  …redistribute copies for     -Includes licenses
  your neighbor                  protecting the integrity
  …redistribute copies           of the code’s author
  including your changes
  to your neighbor
June 2002- The Bush
  Administration files a
  bill to create The
  Department of Homeland
  Security
      Responsible for
      protecting the
      nations critical
      IT infrastructure
2011
  April 17th: PlayStation network is hacked
  The Hacker Groups, Lulz Security and
   LulzRaft are formed
  September: Bangladesh hacker “Tiger-
   M@te” infiltrates 700,000 websites in
   one shot
  October 26th: Sesame street channel on
   YouTube was hacked for 22 minutes
  November 1st: Palestinian territory phone
   and internet networks are hacked
CLAIM TO FAME: KIIS-FM Radio
               Station Contest
MOTIVE: Fun and
Curiosity  Criminal
Exploits and
Espionage

TARGETS: Radio Station,
High Profile Government
Systems
EARLY LIFE: Consultant at the
            Pentagon
  White Hat by Day… Black Hat by
              Night
CRIMES: -Win A Porsche by
          Friday Contest
       -Wiretapped Celebrities
       -Cracked Military Computer
            Discovered FBI
            investigation of former
            Philippines President
            Fernidad Marcos
Penalty: -4 year sentence
         -$56,000 restitution
         -Restricted from computer
          for 3 years

Further
Thoughts…
 Is it worth it? More Likely
 than not, Poulsen wasn’t going
 to use the information he
 extracted from the FBI. Is
 personal satisfaction worth 4
 years of one’s life?
“Well, it's power at your
          fingertips. You can control all
                   1st Juvenile
CLAIM TO FAME:computers from the sent to
          these
                   prison for hacking
          government, from the military,
          from large corporations. And if
MOTIVE: Sense of Power doing, you
          you know what you're
          can travel through the internet at
          your will, with no restrictions.
TARGET: -US Department powerDefense
          That's power; it's a of trip”
                        -School Systems
                        -NASA
Implications: -US Security Breach
                  -NASA forced to shut
  “I certainly learned that there's a
                    down computers
  serious lack of computer security. If
  there's a will, there's a way, and if a
                    $40,000 in damages
  computer enthusiast such as myself was
  determined to get into anywhere, be it
CRIMES: -$1.7 Microsoft, it's been from
  the Pentagon or
                   million stolen
            NASA
  demonstrated that it's possible and they
  will do it. And there's intrusions to
           -Series of next to nothing
  they can do about it, because there's
            school systems
  people with skill out there, and they'll
  get what -Created a backdoor in
           they want.”
           DTRA
              Accessed sensitive emails,
              usernames and passwords
PENALTY: 6 months in
         Juvenile Detention


FURTHER
THOUGHTS…
      In a Post 9/11 world, would
      James receive the same
      sentencing?
Claim to Fame: Received
longest sentence for
cyber crime
TARGETS:-ATMS
        -Credit Card
         holders
             IMPLICATIONS: Millions
             of victims globally
            PENALTY: Serving time
                     until 2025
2004 – - Caught “Cashing
               Installed Operation
         2003 Sentenced Moderator on
       2011 – 2000’s – to Two
        Early – Arrested after
          2008
       Firewall: Tookto be an Informant
                       Down “Shadow
       2007 – & Under year terms
         Out” Ceased Surveillance
                 Had Millions of
       Concurrent 20
        shadowcrew.com
          being
       Crew”
         Credit Card Data

2000         2003     2006      2009   2011

       Meanwhile Prosecution, asked
       To Avoid Obtained over 40
       million Credit Card Data
       to become an informant
“As a leader? Unparalleled. Unparalleled in his ability to
coordinate contacts and continents and expertise. Unparalleled
in that he didn’t just get a hack done — he got a hack done, he
 got the exfiltration of the data done, he got the laundering of
           the funds done. He was a five-tool player.”
       –Seth Kosto, Assistant U.S. Attorney (New Jersey)

Further
Thoughts…
Gonzalez not only betrayed the FBI who
gave him a job instead of jail time, but
also the Black Hat Community.
However, hackers such as Jonathan James
still were willing to collaborate with
him. What are your thoughts on the
relationships in the Black Hat Community?
Kevin Poulsen     Senior Editor of
     “Dark Dante”   Wired Magazine



                    Committed
Jonathan James      Suicide in 2008
     “c0mrade”




Albert Gonzalez
An Inner Look at the Authorities’ Responses
      “Tagging a damage amount or number of machines
    compromised to a single virus (let alone a single
   person) is very difficult. Data can be transmitted
       across the globe in a matter of seconds, and
  computers are infected with malware just as quickly.
      As a result, accurately counting the number of
  machines infected by a particular worm is impossible
                and can only be estimated.”
         -Nicholas Newman, National White Collar Crime Center


LOCAL CASES
  •BANK / ATM FRAUD
  •FICTIOUS EMPLOYEE
  •HOTEL / REWARDS
Other Notable Names…
FRED COHEN               1st Virus


ROBERT T MORRIS        1st Worm
                       (Internet Virus)



SHAWN FANNING
Definition
   Open source software is
   software whose source code is
   published and made available
   to the public, enabling anyone
   to copy, modify and
   redistribute the source code

Problems with Open Source Code
   Problem with stopping
    hacking
   Reputational Technology
      Symantec
   Firewalls
   Company Security Policies
   Mobile Device Hacking
      Apple vs. Android
   Bio-hacking
   Advanced Malware
   Combined Technology Hacking

What direction do you see hacking going
in the future? Think about both the
“Black Hat” and “White Hat” Communities.
Powerpoint
Powerpoint
Powerpoint

Powerpoint

  • 1.
    Death or Glory DiAmanteAstillero Shannon Bona John LoCasio VSB 2006-008 Marcelo Mazzocato December 6, 2011
  • 3.
    A person whoenjoys exploring High Tech of programmable the details Super Spy? systems andor to stretch how their capabilities, as Tech Savvy Anti-Social opposed to most users, who Teen? prefer to learn only the minimum necessary.
  • 4.
    ATTITUDE •Thrill SKILLS •“Moral Obligation” •Programming •Boredom •Write HTMLs •Freedom •Use and run a Unix PERSONAL PREFERENCES •Science Fiction •Meditation •Martial Arts
  • 5.
    •Writing open-source software •Testingand debugging open- source software •Keeping the infrastructure working
  • 6.
    THE GLIDER fromJohn Conway’s Game of Life
  • 7.
    Hacker Cracker AKA “WHITE HAT” AKA “BLACK HAT” •Builds •Destroys •Helpful •Malicious
  • 9.
    1932- Polish Cryptologist Broke theEnigma Machine -Enabled the allies to read substantial amounts of Morse Code Marian Rejewski -Dwight D. Eisenhower considered this hack “decisive” in the Allied victory in WWII Henryk Zygalski Jerzy Rozycki
  • 10.
    1971- John T.Draper (Captain Crunch) hacks AT&T’s long distance calling system Used the toy whistle found in Cap n’ Crunch cereal to generate a 2600 hertz signal allowing him to make free long distance calls John T. Draper (Captain Crunch)
  • 11.
    1983 - thegroup KILOBAUD is formed First Hacker group publically acknowledged Kick started the creation of various groups The 414’s Legion of Doom Masters of Neal Patrick of The 414’s Deception
  • 12.
    The late 80’swere plagued with many worms 1986- Congress passes the Computer Fraud and Abuse Act Arrest of Lloyd Blankenship aka “The Mentor” Author of The Hacker Manifesto Lloyd Blankenship
  • 13.
    Free Software vs. Open Source -The Freedom to… -The Freedom to… …run the program for any …redistribute copies for purpose your neighbors …study how it works, and …make changes change it to do what you -Also includes source want codes …redistribute copies for -Includes licenses your neighbor protecting the integrity …redistribute copies of the code’s author including your changes to your neighbor
  • 14.
    June 2002- TheBush Administration files a bill to create The Department of Homeland Security Responsible for protecting the nations critical IT infrastructure
  • 15.
    2011  April17th: PlayStation network is hacked  The Hacker Groups, Lulz Security and LulzRaft are formed  September: Bangladesh hacker “Tiger- M@te” infiltrates 700,000 websites in one shot  October 26th: Sesame street channel on YouTube was hacked for 22 minutes  November 1st: Palestinian territory phone and internet networks are hacked
  • 17.
    CLAIM TO FAME:KIIS-FM Radio Station Contest MOTIVE: Fun and Curiosity  Criminal Exploits and Espionage TARGETS: Radio Station, High Profile Government Systems
  • 18.
    EARLY LIFE: Consultantat the Pentagon White Hat by Day… Black Hat by Night CRIMES: -Win A Porsche by Friday Contest -Wiretapped Celebrities -Cracked Military Computer Discovered FBI investigation of former Philippines President Fernidad Marcos
  • 19.
    Penalty: -4 yearsentence -$56,000 restitution -Restricted from computer for 3 years Further Thoughts… Is it worth it? More Likely than not, Poulsen wasn’t going to use the information he extracted from the FBI. Is personal satisfaction worth 4 years of one’s life?
  • 20.
    “Well, it's powerat your fingertips. You can control all 1st Juvenile CLAIM TO FAME:computers from the sent to these prison for hacking government, from the military, from large corporations. And if MOTIVE: Sense of Power doing, you you know what you're can travel through the internet at your will, with no restrictions. TARGET: -US Department powerDefense That's power; it's a of trip” -School Systems -NASA
  • 21.
    Implications: -US SecurityBreach -NASA forced to shut “I certainly learned that there's a down computers serious lack of computer security. If there's a will, there's a way, and if a $40,000 in damages computer enthusiast such as myself was determined to get into anywhere, be it CRIMES: -$1.7 Microsoft, it's been from the Pentagon or million stolen NASA demonstrated that it's possible and they will do it. And there's intrusions to -Series of next to nothing they can do about it, because there's school systems people with skill out there, and they'll get what -Created a backdoor in they want.” DTRA Accessed sensitive emails, usernames and passwords
  • 22.
    PENALTY: 6 monthsin Juvenile Detention FURTHER THOUGHTS… In a Post 9/11 world, would James receive the same sentencing?
  • 23.
    Claim to Fame:Received longest sentence for cyber crime TARGETS:-ATMS -Credit Card holders IMPLICATIONS: Millions of victims globally PENALTY: Serving time until 2025
  • 24.
    2004 – -Caught “Cashing Installed Operation 2003 Sentenced Moderator on 2011 – 2000’s – to Two Early – Arrested after 2008 Firewall: Tookto be an Informant Down “Shadow 2007 – & Under year terms Out” Ceased Surveillance Had Millions of Concurrent 20 shadowcrew.com being Crew” Credit Card Data 2000 2003 2006 2009 2011 Meanwhile Prosecution, asked To Avoid Obtained over 40 million Credit Card Data to become an informant
  • 25.
    “As a leader?Unparalleled. Unparalleled in his ability to coordinate contacts and continents and expertise. Unparalleled in that he didn’t just get a hack done — he got a hack done, he got the exfiltration of the data done, he got the laundering of the funds done. He was a five-tool player.” –Seth Kosto, Assistant U.S. Attorney (New Jersey) Further Thoughts… Gonzalez not only betrayed the FBI who gave him a job instead of jail time, but also the Black Hat Community. However, hackers such as Jonathan James still were willing to collaborate with him. What are your thoughts on the relationships in the Black Hat Community?
  • 26.
    Kevin Poulsen Senior Editor of “Dark Dante” Wired Magazine Committed Jonathan James Suicide in 2008 “c0mrade” Albert Gonzalez
  • 27.
    An Inner Lookat the Authorities’ Responses “Tagging a damage amount or number of machines compromised to a single virus (let alone a single person) is very difficult. Data can be transmitted across the globe in a matter of seconds, and computers are infected with malware just as quickly. As a result, accurately counting the number of machines infected by a particular worm is impossible and can only be estimated.” -Nicholas Newman, National White Collar Crime Center LOCAL CASES •BANK / ATM FRAUD •FICTIOUS EMPLOYEE •HOTEL / REWARDS
  • 28.
    Other Notable Names… FREDCOHEN 1st Virus ROBERT T MORRIS 1st Worm (Internet Virus) SHAWN FANNING
  • 29.
    Definition Open source software is software whose source code is published and made available to the public, enabling anyone to copy, modify and redistribute the source code Problems with Open Source Code
  • 30.
    Problem with stopping hacking  Reputational Technology Symantec  Firewalls  Company Security Policies
  • 31.
    Mobile Device Hacking Apple vs. Android  Bio-hacking  Advanced Malware  Combined Technology Hacking What direction do you see hacking going in the future? Think about both the “Black Hat” and “White Hat” Communities.