Free Essay

Hacking Exposed

In:

Submitted By wrocksmith
Words 713
Pages 3
Hacking Exposed

1. What was the crime, who was the criminal, who was the victim, what was the resulting damage of the crime?
The crime was hacking into a neighbor’s Wi-Fi network in 2009 and using it to try and frame them for child pornography, sexual harassment, and various kinds of professional misconduct and to send threatening e-mail to politicians, including Vice President Joe Biden (Kravets, 2011). The criminal was Barry Ardolf the victims’ neighbor (Kravets, 2011). The victims were Matt and Bethany Kostolnik his new neighbors who lived next door to Mr. Ardolf (Kravets, 2011). Mr. Ardolf wanted to destroy the careers and professional reputations of Matt and Bethany Kostolnik, to damage their marriage, and to wreak havoc on their lives. Mr. Ardolf spent two weeks cracking the Kostolnik’s WEP encryption (Kravets, 2011). He then used their own Wi-Fi network to create a fake MySpace page for the husband, where he posted a picture of a pubescent girl having sex with two young boys (Kravets, 2011). Mr. Ardolk e-mailed the same child porn to one of Mr. Kostolnik’s co-workers, and sent flirtatious e-mail to women in Mr. Kostolnik's office (Kravets, 2011). In May 2009, the Secret Service showed up at Mr. Kostolnik's office to ask about several threatening e-mails sent from his Yahoo account, and traced to his IP address, that were addressed to Biden and other politicians (Kravets, 2011). The subject line of one e-mail read: "This is a terrorist threat! Take this seriously." "I swear to God I'm going to kill you!," part of the message to Biden said (Kravets, 2011).
2. What do you think was the underlying motivation of the criminal in the case?
Mr. Ardolf wanted to get back at his neighbors after they told the police he had kissed their 4 year old son on the lips when he was taking him back to his parents when he wandered into his yard shortly after the family moved into their home (Hughes, 2011).
3. Based on the six categories of hackers presented in your textbook on page 93, how would you categorize the hacker in your case? Why?
Mr. Ardolf was a scamp hacker because he wanted to gain some fun out of what he was doing. Mr. Ardolf was an explorer hacker because he was motivated by his delight in the discoveries associated with breaking into the Kostolnik’s computer system. Mr. Ardolf was a vandal hacker because he was a malicious hacker who deliberately wanted to cause damage with no apparent gain for him.
4. What punishment did the criminal receive? Do you think the punishment fit the crime? Mr. Ardolf had turned down a two year plea agreement in 2010 to charges related to the Biden e-mail (Kravets, 2011). The authorities piled on more charges, including identity theft and two child-porn accusations carrying lifetime sex-offender registration requirements(Kravets, 2011). He pleaded guilty to them all last year. Mr. Ardolf was sentenced to an 18 year term in a federal prison in July 2011 (Kravets, 2011). Mr. Ardolf ’s charges will tag him as a lifetime-sex-offender registration requirements and after his release he will be supervised for 20 years (Hughes, 2011). Also, he will be restricted when working with computers by his parole officers (Hughes, 2011. In my opinion the punishment did fit the crime.
5. How do you think this crime could have been deterred?
Based on the research from the Federal Bureau of Investigation (FBI) the crime could have been deterred if the Kostolnik’s had better computer intrusion equipment. The Kostolnik’s should keep their firewall turned on, install and update their antivirus software, install and update their antispyware technology, keep their operating system up to date, be careful what they download, and to turnoff their computer when they are not using it.
Bibliography
Hughes, J. (2011). Minnesota Wi-Fi hacker gets 18 years in prison for terrorizing neighbors. Retrieved February 29, 2012 from http://news.yahoo.com/minnesota-wi-fi-hacker-gets-18- years-prison-032803295.html
Kravets, D. (2011). Wi-Fi-hacking neighbor sentenced to 18 years. Retrieved February 29, 2012 from http://www.cnn.com/2011/TECH/web/07/13/wifi.hacking.neighbor.sentenced.wired/index.html?iref=allsearch

Similar Documents

Premium Essay

Hacking Exposed

...Hacking Exposed 1 Running Head: HACKING EXPOSED Hacking Exposed Crime and Criminal Behavior – CRJ105002016 201003 Hacking Exposed 2 Hacking Exposed Hacking is unauthorized use of a computer and network resources. A hacker is a person who breaks into computers, usually by gaining access to administrative controls (en.wikipedia.org). A 20 year old Tennessee college student named David Kernell broke into the Yahoo e-mail account of U.S. Vie Presidential candidate Sarah Palin. He accessed Palin’s personal e-mail account in September 2008, while she was running as a vice presidential candidate, and used Yahoo’s password reset feature to gain access to her mail. Several of her messages from her account were posted publicly. Mr. Kernell bragged through a posting a message to a poplar message board claiming to have gained access to Palin’s e-mail by using the Yahoo’s password reset features. After a couple of days the internet searching related to this hacking was tracked to Mr. Kernell. The resulting damage of this crime was described by Palin as the most disruptive and discouraging incident of her losing 2008 campaign (www.computerworld.com). Mr. Kernell fits the profile of the average hacker. He is a male between the ages of 16 and 25 and he does live in the United States. He is a computer user. I think Mr. Kernell knew exactly what he was doing and realized that once he got into Palin’s account (her being the vice presidential...

Words: 664 - Pages: 3

Free Essay

Ceh Course

...attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50 Who Should Attend This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Duration 5 days (9:00 – 5:00) Certification The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional). Students need to pass the online Prometric exam to receive CEH certification. Page 2 EC-Council Legal Agreement Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these...

Words: 458 - Pages: 2

Premium Essay

Hacking

...Danish Jamil et al. / International Journal of Engineering Science and Technology (IJEST) IS ETHICAL HACKING ETHICAL? DANISH JAMIL Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick251@hotmail.com MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick89@yahoo.co.uk Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always...

Words: 3982 - Pages: 16

Premium Essay

Ethical Hacking

...Danish Jamil et al. / International Journal of Engineering Science and Technology (IJEST) IS ETHICAL HACKING ETHICAL? DANISH JAMIL Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick251@hotmail.com MUHAMMAD NUMAN ALI KHAN Department of Computer Engineering, Sir Syed University of Engineering & Technology, Main University Road, Karachi, Sindh-75300,Pakistan mallick89@yahoo.co.uk Abstract : This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Keywords— Ethical hacking, hacking, hackers, education and training, risk management, automated security I. INTRODUCTION Understanding the true intentions of the general public is quite a hard task these days, and it is even harder so, to understand the intentions of every single ethical hacker getting into vulnerable systems or networks. Technology is ever growing and we are encountering tools that are beneficial to the general public, but in the wrong hands can create great controversy, breaching our basic right to privacy, respect and freewill. The constant issues highlighted by the media always reporting some type...

Words: 3974 - Pages: 16

Free Essay

Ethical Hacking

...#2 Research Topic – Ethical Hacking 1. http://www.networkworld.com/news/2009/042409-usenix-hacking.html This is a Network World article talking about the legal risks of ethical hacking. The article talks about whether or not ethical hackers risk prosecution themselves. The articles discusses developing a set of ethical guidelines that can be shown to the government when and if they starting taking a greater role in oversight. It mentions that it might be a good idea to work with law enforcements when it comes to ethical hacking. 2. https://www.eccouncil.org/certification/certified_ethical_hacker.aspx This site provides information about becoming a certified ethical hacker. The group doing the certifying is the International Council of E-Commerce Consultants (EC-Council). This is a member-based organization that certifies individuals in various e-business and information security skills. The site provides a great FAQ, exam info, where to get training, and the path to get certified as an ethical hacker. 3. http://www.go4expert.com/forums/forumdisplay.php?f=55 This is a great online forum for those who are ethical hackers, or interested in becoming one. The page warns that the forum is only for ethical or as a learning purpose. It gives many tips, tricks, and tutorials share amongst other ethical hackers in this online community. 4. http://www.purehacking.com/ This company offers penetration testing and other ethical hacking services for a company to use...

Words: 339 - Pages: 2

Free Essay

Ethical Hacking

...Ethical Hacking Overview    Describe the role of an ethical hacker Describe what you can do legally as an ethical hacker Describe what you cannot do as an ethical hacker Hands-On Ethical Hacking and Network Defense 2  Ethical hackers  Employed by companies to perform penetration tests  Penetration test  Legal attempt to break into a company’s network to find its weakest link  Tester only reports findings, does not solve problems  Security test  More than an attempt to break in; also includes analyzing company’s security policy and procedures  Tester offers solutions to secure or protect the network Hands-On Ethical Hacking and Network Defense 3  Hackers  Access computer system or network without authorization  Breaks the law; can go to prison  Crackers  Break into systems to steal or destroy data  U.S. Department of Justice calls both hackers  Ethical hacker  Performs most of the same activities but with owner’s permission Hands-On Ethical Hacking and Network Defense 4  Script kiddies or packet monkeys  Young inexperienced hackers  Copy codes and techniques from knowledgeable hackers  Experienced penetration testers write programs or scripts using these languages  Practical Extraction and Report Language (Perl), C, C++, Python, JavaScript, Visual Basic, SQL, and many others  Script  Set of instructions that runs in sequence Hands-On Ethical Hacking and Network...

Words: 1129 - Pages: 5

Premium Essay

Ipad's Security Breach

...508: The Business Enterprise May 29, 2011 Justifying Hacking into a Web site In 2010, McDonald’s said that customer information was exposed after a security breach involving an email marketing managing firm. McDonald’s released a statement explaining that information was obtained by an “unauthorized third party”, but added that financial information and social security numbers were not part of the data accidentally exposed. (Security Magazine, 2010) A security breach exposed iPad owners including dozens of CEOs, military officials, and top politicians. They, and every other buyer of the cellular-enabled tablet, were vulnerable to spam marketing and malicious hacking. The breach, which came just weeks after an Apple employee lost an iPhone prototype in a bar, exposed the most exclusive email list on the planet, a collection of early-adopter iPad 3G subscribers that includes thousands of A-listers in finance, politics and media, from New York Times Co. CEO Janet Robinson to Diane Sawyer of ABC News to Mayor Michael Bloomberg. It even appears that White House Chief of Staff Rahm Emanuel's information was compromised. In fact, it is believed 114,000 user accounts were compromised, although it's possible that confidential information about every iPad 3G owner in the U.S. has been exposed. (Tate, 2010) Earlier this year, the names and e-mails of customers of Citigroup Inc. and other large U.S. companies were exposed in a massive and growing data breach after a computer hacker...

Words: 3288 - Pages: 14

Premium Essay

Ipad's Security Breach

...This paper will investigate and discuss some of the major issues involving Apple’s security breach. First determine if hacking into a website is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. We will create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking. Secondly discuss if it is important for organizations like Gawker Media to be socially responsible; determine what factors CEOs should consider when responding to a security breach. Lastly, create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue       IPAD’S SECURITY BREACH Determine if hacking into a website is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. According to Bosker (2010), recently, private information of iPad owners have been exposed through a security breach that has brought major embarrassment to Apple Company. Because of the said incident, it was speculated that buyers of the cellular-enabled tablet are susceptive to spam marketing and malicious hacking. This was written in an article, “Apple’s Worst Security Breach: 114,000 iPad Owners Exposed” (Bosker, 2010 p.3). According to Tate (2010) sadly, some CEOs, military officials and top officials were included...

Words: 1991 - Pages: 8

Free Essay

Hacking

...HACKING Did you know that hackers exposed 110 million Americans personal information and roughly half of the nation’s adults in the last 12 months alone. 47% of U.S. adults had their personal information exposed by hackers. In December 8 at New Hampshire the hackers are alleged to have collected the credit and debit card data from over 80,000 victims by hacking. China has highest percentage of hackers, is that 41%. Kevin Mitnick, he has the world best hacking recode and he’s known as “black hate”. In now times big multination brands or company offers prize to hack his own brand or company. For Example google offer $2.7 Million prize fund for those that can hack the chrome OS and Apple offers $1 Million. Hackers are problem because of cybercrime, cyber extortion and virus attack. Hackers are problem because of earning money through business (cybercrime) for example transection money, hack data and sell those data to some on else, hack social sites and expose personal information. Cybercrime is on the increase as new technology allows hackers to be even more anonymous and more dangerous when attacking your computer, network or site. The number, type and seriousness of cybercrime attacks have all increased. Black hat hacker claim he can make $15k to $20k an hour and also he claim like that they can hack 300 billion bits of data in second. Black hat says like that “making money by hacking is easier than brushing your teeth”. For example in 2014 international hacking rings...

Words: 677 - Pages: 3

Premium Essay

Jet Copies Case Problem

...“IPad’s” Security Breach BUS 508: Contemporary Business August 16, 2011 Strayer University Dr. Robert L. Kight Assignment 4: iPad’s Security Breach This document will attempt to discuss hacking into a Web site. Is it ever justifiable? The document will create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking. The document will discuss whether it is important for organizations like Gawker Media to be socially responsible. It will determine factors CEOs should consider when responding to a security breach. Finally, it will create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue and state the rationale. Apply your theory to a real-world case in which someone hacked into a system, including the name of the company and details. As I attempt to discuss this assignment, I could not avoid thinking about the age-old opinion that Apple products were unique, and that they were protected against criminal encroachments. As such, Apple became one of the hottest technological innovations in the industry. Today, like most other such technology, Apple is becoming increasingly vulnerable to intrusion. It is becoming a medium for posing threats to an entire corporate network as well as devices for official and unofficial use. My answer to this question is twofold. In other words qualification of any kind for such conduct must be based...

Words: 1981 - Pages: 8

Free Essay

Compare Services

...Michael Torres Hacker group research Deep Panda This hacking group appears to be sponsored by the Chinese government. It has been tied to several successful attacks in the last year. The security firm Crowd Strike named them Deep Panda. The hacker’s latest work may have been the massive Anthem data breach, which exposed the personal information of more than 80 million insurance policyholders. The cyberattack puts Anthem customers at risk for identity theft throughout their lives, and exposed many to subsequent phishing attacks from fraudsters around the world. Deep Panda has been tied to cyberattacks on U.S. foreign policy think tanks and individuals who are experts on the Middle East and Australian media outlets. A 2014 investigation by Crowd Strike also blamed the group for sending malware to organizations across the U.S. defense, healthcare and technology sectors. Deep Panda is considered one of the most sophisticated hacking groups operating today. Just last month, the Federal Bureau of Investigation warned the cybersecurity community that the group represents a threat. “This group uses a wide variety of tools including generic hacking utilities in order to gain access, establish persistent network access, and move laterally though the victim network,” an FBI official stated in a memo. Flying Kitten This Iran-based hacker group has been in Crowd Strike's sites since mid-January, and is best known for targeting a number of US-based defense contractors and Iranian...

Words: 338 - Pages: 2

Premium Essay

Computer Memory

...Computer Memory Hacking Student’s name: Institutional affiliation: Computer Memory Hacking RAM hacking can be described as a form of hacking that makes it hard for a computer system to process encrypted data. In such a scenario of hacking, all the data that is stored in the attacked computer's RAM is left completely vulnerable for manipulation by unauthorized access in its processing stages. In order to prevent RAM hacking, all the data that needs to be processes and already in the computer's RAM must be entirely encrypted (Philipp et al., 2010, p. 35). There are several tools that hackers can use when RAM hacking, which include several programs and utilities. The most common tools of RAM hacking is Nmap and Metasploit. Nmap, also referred to as the swiss army knife of RAM hacking or any other hacking, is one of the best effective port scanner tool numerous functions. In its hacking, Nmap is used in a footprinting phase to scan the ports of the remote computer, where it finds out which ports are open in order to compromise their access. Metasploit, on the other hand, is also an effective tool in RAM hacking as it commands a large database of exploits. In addition, it offers thousands of exploits codes that are useful on attacking web servers and computers (Levy, 2010, p.28). This is a hacking tool that hacks not only the RAM, but the almost entire part of a computer. Hackers always attack and succeed where they...

Words: 628 - Pages: 3

Premium Essay

Ethical Hacking

...As the internet is growing there has been a higher demand for network security. With the higher demand comes a new form of job known as ethical hacking. An ethical hacker is a person that conducts penetration testing on networks to test the integrity of a network for any given business or corporation (White hat (computer security)). With this technique, corporations and businesses will have the assurance they need for protecting their personal identifiable information (PII) on their network. To beat a hacker, first you must think like one. Ethical hacking is an accepted hacking method of network security systems for a particular business or corporation. Ethical Hacking has provided network security administrators with the knowledge they need to continually keep their network secure. With this method of penetration testing, you can see that there is no negative effect on a business or corporation’s network security. The ethical hacker must first receive authorization. If authorization is not obtained, ethical hacking can be considered a federal offense punishable by a prison sentence of no less than five years (Computer Hacking Law & Legal Definition). “The authorization can be as simple as an internal memo or e-mail from your boss if you're performing these tests on your own systems. If you're testing for a client, have signed contracts in place, stating the client's support and authorization” (Beaver). Once authorization has been made you will need to develop a strategy...

Words: 857 - Pages: 4

Free Essay

Phone Scandle Case Study

...time that phone hacking scandal caught the attention from the general public was in November 2005, when Prince William’s knee injury, which was only known to few cronies, was exposed as news by News of the World. Former NOtW royal editor Clive Goodman was accused of hiring private detective Glenn Mulcaire for phone hacking activities. The major victims were celebrities, politicians, and members of the British Royal family. Later in 2006, both Goodman and Mulcaire were sentenced. The chief editor Andy Coulson then resigned from the newspaper. However, in July 2011, it was revealed that the phone of missing school girl Milly Dowler had also been hacked by a journalist from the News of the World. The messages in the voice mail box had been erased, which gave false hope survival to police and the girl’s family and potentially destroyed valuable evidences about the girl’s abduction and murderer. Within more and more , resulted in a public outcry against the News International. On the 8th of July, after the British Parliament’s urgent debate regarding the affair, British Prime Minister David Cameron announced that a public inquiry would look in to the scandal and that further investigations needed to be conducted. Due to advertisement boycotts and unrelenting public pressure, News of the World ended its 168 years publication on 10th of July. Eight days later, former News of the World reporter Sean Hoare was found dead. He was the first to allege phone hacking at the publication...

Words: 3036 - Pages: 13

Free Essay

Ethical Hacking

...Ethical Hacking Computer Ethics – CIS 324 Dr. Nelson Stewart June 7, 2013 INTRODUCTION When most people hear the term “hacker” they think of an evil person committing crimes by hacking into their computers to steal, destroy and/or steal identities. This is so in some cases, but not all hackers are bad. Hackers are merely curious technically skilled individuals who gain unauthorized access to computers, networks of various companies, organizations and individuals. Good hackers are considered white hat hackers. They are the ones that are hired to break into systems as a way of testing the vulnerabilities and security issues that may be present in the computer system. Bad hackers are considered black hat hackers. They are the “evil” hackers, or should I say “crackers” who hack into systems to steal identities, information, crack into software programs and create nasty viruses. What is Ethical Hacking? Ethical hacking provides a way to determine the security of an information technology environment – at least from a technical point of view. As the name ethical hacking already tells, the idea has something to do with hacking. But what does “hacking” mean? The word hacking has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as “crackers”), the...

Words: 1280 - Pages: 6