Preview

Take Home Midterm

Good Essays
Open Document
Open Document
1653 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Take Home Midterm
Anthony Samaha
Cscd 434 network security
Midterm

1. Infamous hacker Andrew Auernheimer, aka "Weev", was convicted of conspiracy to access a protected computer without authorization, a violation of the Computer Fraud and Abuse Act (CFAA), as well as fraud in connection with personal information, in United States Third Circuit Court today (Nov. 20). All he did was exploit the weaknesses that AT&T ipads had its own cellular ID number, or integrated circuit card (ICC) ID, in the URL, or Web address, that it used to access the AT&T website. He then found that subtly altering the cellular ID numbers in the URL would generate different email addresses on the AT&T site.

Another hacker wrongfully accused was named Jonathan James, or c0mrade. He was convicted and sent to prison for hacking in the United States–all while he was still a minor. At only fifteen years of age, he managed to hack into a number of networks, including those belonging to Bell South, Miami-Dade, the U.S. Department of Defense, and NASA.
James hacked into NASA’s network and downloaded enough source code to learn how the International Space Station worked. The total value of the downloaded assets equaled $1.7 million. To add insult to injury, NASA had to shut down their network for three whole weeks while they investigated the breach, which cost them $41,000. In 2007, a number of high profile companies fell victim to a massive wave of malicious network attacks. Even though James denied any involvement, he was suspected and investigated. In 2008, James committed suicide, believing he would be convicted of crimes that he did not commit. His scenario is pretty similar to that of Aaron Schwartz.

I may not know exactly how to fix these unfair laws, I think instead of putting these hackers away for years, why not use their skills to benefit society? Maybe a certain amount of hours required for them to teach a class at a community college or high school on how to program, hack, and

You May Also Find These Documents Helpful

  • Good Essays

    Practice Midterm

    • 551 Words
    • 3 Pages

    Honour code: I promise not to cheat on this exam. I will neither give nor receive any unauthorized…

    • 551 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    In 2004, 18 year old Jason Salah Arabo from Michigan was arrested and pleaded guilty with conspiracy to order destructive computer attacks on business competitor’s websites from his home by remotely controlling them with a computer program called, “Bot”. Bots can be easily disguised as MP3 music files or pictures that unaware users download from public websites. Once they are downloaded, Bots will cause the virus to overload the website’s hosting computer server that result in crashing the entire system. Arabo wasn’t alone in this process. He and former 16 year old “Jasmine” Signh from New Jersey, creator of the Bot, had met Arabo on an instant messenger chat, and had agreed to help takedown Arabo’s competitor websites in exchange for Arabo’s merchandise, including designer sneakers. Arabo was running two business companies that sold throwback sports apparel such as team jerseys over the internet. Together, Arabo and Signh had designed the program in what they thought would help Arabo’s business by stopping customers from visiting and using other services.…

    • 459 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Good Essays

    “According to court records the massive T-Mobile breach first came to the government's attention in March 2004, when a hacker using the online moniker "Ethics" posted a provocative offer on muzzfuzz.com, one of the crime-facilitating online marketplaces being monitored by the Secret Service as part of Operation Firewall.” ( Google\ Tmobile.com)…

    • 241 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    In particular, that 45% of the court circuits have adopted as broad interpretation of the law while only 36% have adopted a narrow interpretation of the law (Mikulic, 2016). The cautionary tale that the author spelled out in part I of the article was in particular an eye opener. The famous hacker and “internet troll” (Lennard, 2014) Weev (Andrew Auernheimer) was “sentenced to 41 months in federal prison for revealing to media outlets that AT&T had configured its servers to allow the harvesting of iPad owners' unsecured email addresses” (EFF, 2013). Both Weev and co-defendant Daniel Spitler used “a script that [exploited] the security hole to collect roughly 120,000 email addresses” (EFF, 2013). Weev was indicted under the provisions of the CFAA law, in particular the broad interpretation of the law. In which Weev had exploited a security hole that AT&T had failed to secure. I found that the author described a strong case where millions of Americans can be punished under the broad scope of…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    midterm

    • 322 Words
    • 2 Pages

    The Midterm exam consists of 25 multiple choice questions worth 4 points each, and five essay questions worth 20 points each for a total of 200 points. It covers material learned in Weeks 1–4, including the following TCOs:…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bendelladj Research Paper

    • 614 Words
    • 3 Pages

    Latterly, while scrolling through my Facebook newsfeed, I stumbled across a very interesting photo – shared by one of my friends. It claimed that Hamza Bendelladj, a 27-year-old, Algerian hacker had been sentenced to death by a US judge after allegedly co-creating a banking Trojan horse known as “SpyEye”. The Trojan has reportedly infected more than 1.4 million computers across the globe. It was used to steal millions of dollars from more than 200 American banks and financial institutions after obtaining sensitive information from computer systems, which the hacker had then apparently, donated to several Palestinian charities.…

    • 614 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Midterm

    • 3287 Words
    • 14 Pages

    1. In this essay, please fully explain—in your own words and fully cited-- what Mills means by “the sociological imagination” and then discuss how it might be used in escaping from the inequality trap. Please use a standard 5 paragraph essay format. The first paragraph should be devoted to Mills and the following paragraphs should put Mills “in conversation” with Schwalbe. I expect to see both authors fully cited in the body of your text.…

    • 3287 Words
    • 14 Pages
    Better Essays
  • Good Essays

    Midterm

    • 683 Words
    • 4 Pages

    Each Multiple Choice Question is worth 3 points. Please place the letter that corresponds with your answer(a, b, c, d, or e) in the appropriate box below.…

    • 683 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Kevin Mitnick

    • 1277 Words
    • 6 Pages

    The word hacker in today’s society has many meaning, but the definition that I will be talking about in this paper is best described by dictionary.com as, “One who uses programming skills to gain illegal access to a computer network or file.”[1] According to wikipedia.com there are three different types of hackers, white hat hackers, grey hat hackers and black hat hackers. A white hat hackers is, “. . .a person who is ethically opposed to the abuse of computer systems. Realizing that the Internet now represents human voices from all around the world makes the defense of its integrity an important pastime for many.”[2] A grey hat hacker is, “. . .a skilled hacker who sometimes acts legally and in good will and sometimes not. They are a hybrid between white and black hat hackers. They hack for no personal gain and do not have malicious intentions, but occasionally may or may not commit crimes in their actions.”[3] And lastly a black hat hacker is, “a malicious or criminal person whose correct label is "cracker". . .Usually a Black Hat refers to a person that maintains knowledge of the vulnerabilities and exploits they find as secret for private advantage, not revealing them either to the general public or manufacturer for correction.”[4]…

    • 1277 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 482 Words
    • 2 Pages

    Bibliography: Computer Crimes. (2007, Spring)American Criminal Law Review,285(51). Retrieved July 1st from Gale Power Search Database…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    a profit. Hackers hate authority that stands in the way of their financial goals. The penalty for…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Podgor, Ellen. (n.d.). COMPUTER CRIME. encyclopedia of crime and justice entries. Retrieved (2010, May 6) from http://www.highbeam.com/doc/1G2-3403000048.html…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Now I would like to move on to some stastistics. According to the internet crime complaint center also know as the IC3 a partnership with the federal beauro of investigation, the national white collar crime center and the bearo of justice assistance. The percentage of people hacked within the last year has increased 22 from last year.…

    • 521 Words
    • 3 Pages
    Good Essays

Related Topics