|
Hackers |
|
"As the majority of hobbyists must be aware, most of you steal your software. Hardware must be paid for, but software is something to share. Who cares if the people who worked on it get paid?" Bill Gates Open Letter to Hacker Hobbyists, Feb. 3, 1976
The earliest computer hackers often were individuals with sophisticated computer skills who simply enjoyed exploring programming and stretching their computer’s capabilities. Hackers of this type still exist. Others, however, use their skills to write damaging code that propagates over the Internet or to break into private networks for malicious or criminal purposes. While many malicious hacker attacks rank as nuisances rather than being harmful, other hackers have moved into more damaging hostile or criminal activities, producing increasingly sophisticated malicious technologies and tools that proliferate across the Internet. Some of these hackers are taking advantage of their skills to earn money through information theft, identity theft, fraud, denial-ofservice (DoS) attacks, and extortion. The impact of hackers may expand even further if nation states and others, such as terrorist or organized criminal groups, hire the talent or exploit the hacker developed technologies. - Federal Plan for Cyber Security and Information Assurance: Research and Development, NSTC p. 7 (April 2006)
Federal Activity
- FTC, Department of Justice to Host Forum on Child Identity Theft, FTC 6/6/2011
- Mar. 8 Senate Commerce Committee hearing on Internet Security / Hacker Attacks 9:30 am Room 253 Russell SOB.
- Mar 9 Senate Small Business Committee CyberCrime: Can a Small Business Protect Itself? 9:30 a.m. 428A Senate Russell Office Building.
Consumer Information
Papers
- USG
- DOJ Tracking a Computer Hacker, Daniel A. Morris, USA Bulletin (May 2001)
- DOJ It's Not Just Fun and "War Games" - Juveniles and Computer Crime, Joseph V. DeMarco, USA Bulletin (May 2001)
- DOJ Working with Victims of Computer Network Hacks, Richard P. Salgado, USA Bulletin(March 2001)
- DOJ Supervised Release and Probation Restrictions in Hacker Cases, Christopher M.E. Painter, USA Bulletin (March 2001)
- FedCirc 01.23.02 Hack, Counter Hack: Understanding the Adversary's strategies
- DOE Hacking U.S. Government Computers from Overseas
- DOE How Hackers Work
- David W. Opderbeck, Cybersecurity and Executive Power, Seton Hall Public Law Research Paper 3/25/2011
- Stuxnet as Cyberwarfare: Applying the Law of War to the Virtual Battlefield, SSRN 7/28/2011
- Caroline Eisenmann, When Hackers Turn to Blackmail , HBR Case Study, October 2009
- PBS Frontline HACKERS
- How to 0wn the Internet in Your Spare Time ICSI 10/30/02
- The worm that ate the Internet? NWFusion 10/30/02
- Researchers predict worm that eats the Internet in 15 minutes NWFusion 10/24/02
- W. Reid Wittliff, Computer Hacking and Liability Issues: When Does Liability Attach
- Michael Lee et al., Electronic Commerce, Hackers, and the Search for Legitimacy: A Regulatory Proposal, 14 BERKELEY TECH. L.J. 839 (1999)
Books
- Kevin Poulsen, Kingpin: How One Hacker Took Over the Billion - Dollar Cybercrime Underground (Crown)
- The Cuckoo's Egg, Clifford Stoll
- Jason Franklin et al., An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants , 2007
Links