4. Computer Hacking - History 1960 MIT (Massachusetts Institute of Technology) Tools & Hackers Tools (nerdy student) Hackers (lazy student) Personal Computer Telephone Systems – Phreak Software – Crackers
5. Computer Hacking - Motivation Imaginative pursue – Hobbyists (modifications of electronic hardware) Financial means – Job & Crime Hackers vs. Crackers
6. Computer Hacking - Consequences Unauthorized use of a computer or network Kevin Mitnick (Sentencing depending on the seriousness of the offence) Little to no-time served (3)
7. Computer Hacking – Major Crimes Adrian Lamo (New York 2003) Unauthorized access to a computer and possession of illegal stolen access devices Kevin Mitnick Most wanted computer criminal (U.S) 1979 Unauthorized access (age 16) Valuable info/ (Cellular telephone and computer companies, computer passwords)
8. Computer Hacking – Ethical Stands Hacker ethics (Whether they can do it or not?) When they can do it would they go further? Hackers and Crackers (4)
20. Summary & Conclusion Computer hacking was once an apt crime for a person whose computer skills exceeded others’. Now computer hacking could be performed by anybody that knows how to use the internet. Furthermore this crime is one of the hardest to detect, because the criminals do not leave any mark behind.