By: Patrick Wales & Tomas Smaliorius
Baase Ch 5 and Johnson Ch 6
The Early Day’s of Internet &
A hacker was a creative programmer who
wrote elegent or clever programs
Regarded as a “Computer Virtuoso”
By early 1980s, hacking took on the
meaning that most people are familiar
Why the shift?
Companies began using copyright
and restrictive software license to
Would the internet be as useful to you if
all the information
A Hacker’s Defense
All information should be free
Break ins illustrate security problems
No Harm, No Foul
Keep Big Brother at Bay
All information should be free
Too much information was becoming
People are entitled to the access of
ex: the creation of libraries ( equal
Makes collaboration easier amongst
Who determines what information should be
available or protected from wide
distribution? An individual, a company, a
law, or a country?
Is too much information/knowledge a bad
Corporations have an invested
interest to stretch the truth.
Dietary supplements don't have to
be approved by the FDA the same
way that pharmaceuticals do.
Break Ins Help Illustrate Security
On November 2, 1988 Robert T. Morris, a computer science
graduate student, launched a worm
Was the first of its kind, caused systems to slow down
Wanted to demonstrate the weakness of the system after he was
ignored by administrators…except he made an error
If the security system is that poor, is it the hackers fault for
exposing its weakness?
Are we better off after having that attack?
Would there be security problems if hackers didn’t attempt to break
No Harm, No Foul
If a hacker changes nothing, while
learning something about the computer
system a net benefit results
“Datastream Cowboy”, age 16
Wanted proof of existence of aliens
What are the consequences with these
sorts of actions?
What happens when a programmer doesn't
know what he's doing and screws something
What happens if a hacker see's something
that he/she wasn't intended to see?
Compromising national securities.
"Well, its their fault for bringing their kids to
official military statement:
"There is no
question that coalition forces were clearly
engaged in combat operations against a
hostile force," said Lt. Col. Scott Bleichwehl
Keeps Big Brother at Bay
To The Rescue
An activist group
Uses the computer as its weapon to leverage
Operation Last Resort
Demands reform of computer crime laws
In regard to the suicide of Aaron Swartz
Recent Activity: Break in on Federal
Has the computer become a stronger
weapon than a gun?
Is this a valid protest, similar to sit
Are groups like these useful?
Necessary to protect our liberties?
Have any real impact?
Physical crimes now
use IT as a medium
Breaking and entering
How do you quantify these crimes without the physical
presence or fear factor?
Should cyber criminals who commit these crimes using
IT as a medium be subjected to the same punishment
as the criminals who commit these physical?
New crimes created by IT
Spyware / Malware
Is this the same crime, but different
Are they at all the same?
Life sentence? No sentence? Just defamation?
Megaupload site taken down by New Zealand and
175 Million in Profits
500 Million in piracy losses
Ok over national lines? Allied Lines? Axis lines?
So not just for free information?
Idchief.com making ids f
alcohol in the U.S and around the world?
and also for some terrorists.
Can the government take these guys down as
Is it worth it? Are we the problem?
Illegal file sharing site for individuals and
groups like anonymous.
Who is to blame, the website for providing the
service or the users for demanding and using it?
Minor conflict of interest
Is it YOUR FAULT for giving him/her your
“Your credit card has
been turned off for
Please call this
number to clear this
issue with our security
Hacker from Pompano
So does technology balance itself out?
due to cleanup
Apply Ethical Reasoning to it
How would a Deontologist react to computer
Law of univers
How would a Utilitarian react to computer
Act, case by
case? Rules? Do we
care if a few criminals get too severe of a
Would any of them think that it is perfectly
Virus and Malware software are used to protect the
Are they safe?
Of the 82 new computer viruses, when matched up against
top antivirus products, initial detection rate was less than 5
New Methods are needed
Is use of antivirus software an ethical responsibility and
not just a personal choice?
When you are on a network
with other computers?
Will anyone be fully safe?
that are unique to
to authenticate the
Is biometrics a foolproof
Will biometrics prove to be
safer or reveal that much
more about the individual?
Legislation against the Cyber Criminals
Computer Fraud and Abuse Act (1986)
USA PATRIOT ACT
Raised the maximum penalty
Monitor online activity of suspected hackers
without a court order
What happens when our surveillance capabilities
progress? Drones? Satellite imaging / tracking?
Why didn’t SOPA or PIPA pass? Wasn’t it to
help deter cyber crime?
The Use of Warrants
Amendment to the US Constitution requires search
warrants to be specific as to what is to be searched
Search warrant issued for drug crimes
While opening files, child pornography is also discovered
on the computer
Does the idea of plain view insight applies to computers?
Can a search warrant for a computer be used to uncover other
Whose Laws Rule the Web?
Yahoo and the selling of Nazi merchandise in France
The current online gambling situation
Which country's laws should apply when Web
content crosses borders?
Can US arrest individuals who did not break the law
of their country, but violated US law or vice versa?
How have we addressed the global
FBI arrest 24 individuals involved in
international cyber crime
8 Countries involved
If countries work together, can they reduce
the number of computer crimes?
Is the U.S. allowed to punish people in other
Where are we Heading?
Is the future safe
Would you rather be over or under protected by the
What happens when our minds are connected to the
Will there be laws against thoughts?
Can your mind be hacked?
Are you willing to forgo technology to protect yourself even
if it means being cut off socially?
Will there ever be a point that we completely dismiss
technology and go back to our agricultural ways?