Cyber Conflict Study Center

 

Cyber Crime (Illegal Exploration and Hacking)

The first type of computer attack combines several different types of unintentional actors into one category defined as cyber crime or "hacker". Although this category of hacker includes many kinds of cyber criminals, from a DOD perspective, the motivation of a hacker without intent to damage the national security of the United States is the importance difference. Therefore, it is necessary to differentiate between cyber crime and other levels of computer attack because it will affect the type of DOD response.

Cyber crime in the form of a cyber intrusion (hacking) is illegal access into a network system and can range from simple exploration causing no damage to malicious hackers who are intent on causing loss or damage. Most information systems tend to divide the world into at least three parts: outsiders, users, and superusers. A popular route of attack for hackers is first to use a password attack so that the outsider becomes a user, and then once a user, he will use known weaknesses of Unix programs so that he can access superuser privileges. Once a superuser, a hacker can read or alter files; control the system; make it easier to re-enter the system (even after tougher security measures are enforced); and insert rogue code (e.g., a virus, logic bomb, Trojan Horse, etc. for later exploitation. Although the other levels of cyber-attack to include cyberespionage,
cyber-terrorism and information warfare also use a similar method of hacking into an internet connected system, the main distinction between a hacker and the other levels is the intention of the perpetrator.

In his book, "Fighting Computer Crime", Wiley identifies several types of cyber criminals. They range from pranksters who perpetrate tricks on others to career criminals. Pranksters generally do not intend any particular or long-lasting harm. Wiley identifies hackers as individuals who explore other‘s computer systems for education, out of curiosity, to achieve idealized social justice or to compete with their peers. They may be attempting to gain the use of a more powerful computer, gain respect from fellow hackers, build a reputation, or gain acceptance as an expert without formal education. Malicious Hackers, sometimes called crackers, are intent on causing loss (in contrast to achieving illegal gain) to satisfy some antisocial motives. Many computer virus creators and distributors also fall into this category.

Another form of cyber criminal is the career criminal. These individuals earn part or all of their income from crime, although they do not necessarily engage in crime as a full time occupation. Some have a job and steal a little and then move on to another job to repeat the process. In some cases they conspire with others or work within organized crime gangs such as the Mafia. According to the FBI, many of these criminal alliances use advanced information technology and encrypted communications to elude capture. 

In most cases, hackers who are intent on penetrating DOD systems are doing it for the challenge and thrill. Hackers are motivated by a variety of factors, including thrill, challenge, pleasure, knowledge, recognition, power and friendship

In a survey of 164 hackers, the three main reasons for hacking were (in decreasing order) challenge, knowledge, and pleasure, all of which are positive aspects beneficial to discovery learning. These accounted for nearly half (49%) of the reasons cited. Another 24% were attributed to recognition, excitement, (of doing something illegal), and friendship. The remaining 27% were ascribed to self-gratification, addiction, espionage, theft, profit, vengeance, sabotage, and freedom.

The Centre for Infrastructural Warfare Studies estimated in December 1997 that there were fewer than 1,000 professional hackers worldwide at the time. They defined ”professional hacker‘ as someone who is ”capable of building and creating original cracking methods‘. He has superior programming skills in a number of machine languages and has original knowledge of telecommunications networks. In terms of objectives, his goals are usually financial.

This first group of cyber criminals or "hackers" can be categorized as Unintentional Cyber actors. Although they have a variety of motivations ranging from simple exploration to criminal intent to defraud or financially gain in some manner, they are not considered intentional cyber actors targeting national security. Because they are simply criminals, a DOD response to these types of cyber attacks should be considered as a legal response to stop and prosecute criminal actors.

Comments :

0 komentar to “Cyber Crime (Illegal Exploration and Hacking)”

Posting Komentar