Saturday, 13 June 2009

Task 2 Reflection: Computer Crime: The ethical issues surrounding hackers and hacking

Task Two:

Working in your groups produce a short account (1 A4 page) expressing your ideas concerning computer crime relating to hackers and hacking and the ethical issues surrounding this issue.

39 comments:

Muni said...

This is Adavelly Muninder Reddy,
My result is....

Economic Left/Right: 0.00
Social Libertarian/Authoritarian: -1.54

Unknown said...
This comment has been removed by the author.
Unknown said...

Hello friends, I am krishna Bonda
As expected task 2 is interesting too.. its all about HACKING and surveillance.

I am big time GIZMO freak guys. The video which we have seen in our lecture covers some of them in it. I was like continuously thinking about DIE HARD 4 movie, it was fully packed with white and black hackers, hope you have watched the movie.

The lecture video was simply awesome. The video shows us how well a person can be tracked out unknowingly.

Task about Hackers and computer crime..interesting
will be soon with some stuff

Anonymous said...

hey guys...was'nt it a wonderful lecture last monday...the BBC episode we saw was really good.....it was first time i noticed that technology can actually be a very powerful weapon which when misused can destroy our peaceful life.....i mean can u imagine someone watching u 24/7 and you do not even know u r being watched...thats scary.....its so unethical.....

Anonymous said...

hey u know this may sound a little bit weird but after last week lectures i think i want to be a hacker......hey guys dont get me wrong....by hacker i mean definately a WHITE HAT one.....just imagine the depth of knowledge required to hack into other hackers information....to hack their passwords and save the damage to happen to the world....instresting job yaa...m fasinated....definately...giving a thought abt it........

Anonymous said...

hey chaitu...i wanna know more about this movie DIE HARD 4...is it really about hackers...then defintely m watching it this weekend........

Unknown said...

Yah rugveda.. the movie story line is based upon hacking the software network and grabbing upon all important military information and bank details. I get to see white hackers and black hackers in it, to be frank I didn't knew that hackers are also segregated according to there working style, I just considered them as Hero and villains.

Unknown said...
This comment has been removed by the author.
Anonymous said...

Hi guys how you doin?? yea Chaitu and Rugveda thats nice movie to watch and get some knowledge about hacking stuff, you can even see "The Italian Job" and "Revolution OS" (in this they try to hack the open source OS such as Linux) even it sounds good as it consist both the white and black hat hackers.Its really awsome to watch before our group assignment so that we can discuss some core concepts as well.

Unknown said...

Yah guys its true..
gaining knowledge always by reading is boring..
(in this case)
Hope watching movies will help you to do better because they give you a brief idea about what are its effects on present scenario.(in this case)

Hope we end up with good conversation with our group members and come up good points.

Don't watch too many movies of this genre otherwise you won't get time to do your assignment.
"Just kidding"

Unknown said...

the lecture on hacking and hackers gave me more knowledge on the types of hackers and the reasons they do hacking. some just for fun and some for money. even though it was to gather evidence that the family was causing disturbance to the neighbours, it was fun watching the video the one in which the neighbours focused cameras in the front and backyard of the particular family.if hacking is done in an ethical way,that does not harm others, then i don't think it is a problem.

nobody would like others to keep track of you 24/7 and the videos shown in the lectures demonstrated how well a person can be tracked and watched.

anyways it was a wonderful lecture where we discussed about hacking and hackers. doing the group assignment is also fun as we discuss a lot about hacking.

Unknown said...

Hi frnds in my opinion hacking is very difficult then writing a programming.The hackers are very intelligent people then any other programs i learn a lot of in the previous class about hackers its a very interesting topic.Frnds in DIE HARD 4 movie we can find how the hacking will be performed its very interesting movie....................

Unknown said...
This comment has been removed by the author.
Unknown said...

hi friends the previous class is very interesting.Before i have an idea about hacking but in the last class i understood clearly.hacking has both the faces good and bad.

kumar said...

hai friends i want to post a comment on hacking and ethical issues.i know very little about hacing,when i listen to your hacking lectures i learned so many things.
now a days these hacking are used for good and bad ones.by these hacing techniques we can capture another persons importat data.these hacking techniques are very helpful in military operations.
In this lecture i had seen an hacking and survilance vedio it's awesome.i am intrested in hacking because hackers are good programers.

Unknown said...

hi

Anonymous said...

computer crime a worse scenario guys just have a look at this
http://www.crime-research.org/news/24.05.2005/1255/

Unknown said...

@@ Atish

Hey the article was interesting.. got to know many dirty minds are working.
please do share in future its fun reading articles like this.

Rajesh said...
This comment has been removed by the author.
Rajesh said...

Hi friends the video about hacking made everyone little bit tension. I got to know about hacking and hackers clearly. I heard about hacking during my BTech too. Hackers are bloody fools.They misuse the personal information and it leads to crime and sometimes if any hacker got one's id and password he may send warning mails to national main leaders. So in this case if any leader got any warning mail so definitely enquiry will be done over that warning mail. So innocent one will be deceived because of hacker. Terrorists use this type of tricks. I am not saying this blindly. I heard one case like this in INDIA. So friends beware hackers.

Unknown said...

hey rajesh..
hackers are troubling each and every country in one form or the other.

krishna bonda

Rajesh said...

hey chaitu I told one example which was happened in India. Of course every where this is happening.

Unknown said...

yah yah..
I was like generalizing it nothing else, anyways you have pointed a good example to the present case

Unknown said...

@@rajesh

It would be great if you can provide the relative information about the case you got to know.
cheers

Rajesh said...
This comment has been removed by the author.
Rajesh said...

Hi friends, I found a story of one hacker Mr.Gary McKinnon ,the british HACKER who hacked 97 US Military and Nasa computers from his north LONDON home.
If u want more about him and his hacking please follow the link of my own blog
http://rajeshmit.blogspot.com/ and there at the right side u can find "About hacking and hackers" in blog archive please click on that.......

vijays15 said...

Hi Friends,This is Vijay Puppala
The lecture of Hacking and Hackers was really intresting. I did had some information about the Hackers before but after seeing the video (i,e.BBC who's watching you)i found that everything we do is observed and recorded in all means,which is gud interms of security purpose but one's privacy is exposed. Anyway we are in the world of Hackers and hacking beside you evertime.

Temitope Akinloye said...

Have you guys seen the movie "swordfish"? It was a sci-fi movie in 2001, it gives a good insight into proper blackhat hacking. Its a story about a hacker who was employed by a villain to hack into several banks' database and transfer money electronically accross highly encrypted and secured networks, its pretty crazy! I also enjoyed the matrix as well, the movie was a complete metaphor about life within computer systems and networks, hacking and viruses. The matrix could be seen as a rather complex story for people without much details of computer systems and how it works, but pure jargon poetry and inspiration for people with knowledge in the area of hacking!I also think that the whole hacking thing is a very exciting area becuase it just amazes me how much skill people acquire to carry out hacking activities.

Anonymous said...

Ok, just a good question for everyone , when does blackhat hacker become a white hat hacker ? For example , when the govenrment mostly in the United States employs intelligent blackhat hackers with the intention of making stop unethical behaviours of other individuals on the internet. So is this black hacking turning to white hacking ? Hey , hey, but I am sure the CIA also uses them to spy on people isn't it ? Thats unethical but this used to track criminals inthe worl, so whee do you put this class of hackers ? black or white hackers ? I need some answers please...........

Anonymous said...

Hey sorry guys, this Adeboye Oni

Anonymous said...

@ rugveda and chait212, I can see you folks have been watching so many movies,you can recommend some more to educate us ..... lol . Ok, just my thought on hacking, they are a group of very talented people, I mean to hack into some delicate databases in the Unites States takes something really big. But just as the ethics and morals are built around the environment in context, so can we also fix hackers and this is what I think distinguishes the black hat from the white hat hackers. But I am still dumbfounded, is hacking for the authorities ethical ? or what do you guys think ? it good thing has it helps us stop crime and other thing that are affcting our world negatively but it is still intrusion int laces without invitation and for every equal human, that is simply not right , is it ? tell me guys ....

abu shinx said...

@ boyeni, they are offcourse white hackers since they contribute in fishing out the black hackers.

abu shinx said...

@Tope hope you are not gonna be travolta,that is against the code of ethics.If you are going to be pls be a white hat.

Unknown said...

the comment on hackers where they change from black hat to white hat hackers is interesting. i do agree with u in this matter as a lot of government organizations including the CIA or FBI used hackers to monitor and hack into other's systems. but i believe these are not done with the intention of harming others.

Unknown said...

hackers are intelligent people and the reality is that an innocent person gets caught for the work that a hacker has done. the code of ethics is violated here.

abu shinx said...

@ kenni, how about the feeling of being uncorfortable by individuals, is that ethical?as predited by Nasbiit(1982) the "new source of power is not money in the hands of individual but the information in the hands of many"information in the hand of FBI,CIA could be detramental, u might not know on what bases it is giong to be used...why it is that every arab in USA is a terrorist?just give a thought that way..

Unknown said...

Hackers are highly skilled computer gurus who break into computer systems for a variety of reasons, from financial gain to just for the fun of a challenge. Despite these activities being illegal, the hacker community has maintained momentum for decades and shows no signs of slowing down.

Function: Hacking is an activity that is engaged in by people who use their knowledge of the internet, computers, firewalls and security preferences to break into other people's computers, allowing them to view private information, alter data and steal files, information or programs. MySpace pages, software applications and email accounts are the most common programs that are hacked into. Hackers typically look for passwords or credit card information. Some will simply hack into these programs in order to change information, such as a screen name, password or other content that is written by the owner.

Significance: Hackers are sometimes motivated by greed and steal personal information in order to take on someone's identity for their own gain, or in politics, where they try to exploit, blackmail or otherwise expose someone in power, or even just for entertainment, where hackers simply want to see what they are capable of doing. These types of hackers usually brag about their conquests on message boards or instant messaging programs, competing with fellow hackers as to who is the best among them.
History: The first case of hacking occurred in the 1960s when a group of students at the Massachusetts Institute of Technology (MIT) tried to access the school's main computing systems. In the 1970s, "phone phreaks" hacked into telephone networks and made toll-free calls. Mainstream computer hacking as we know it today gained momentum in the 1980s when hackers broke into what would now be considered message boards. Congress passed the Computer Fraud and Abuse Act in 1986, which made it illegal for anyone to break into anyone else's computer system. Despite the law, the 1990s saw the invention of the Trojan Horse, which allowed hackers to access any computer that downloaded the program. Many companies were hacked into as well, such as AOL, Yahoo!, Amazon and eBay.
Types: There are at least five main types of hackers. A hacktivist uses his hacker skills in order to broadcast a political message on the Internet. A cyberterrorist commits acts out of a desire to wreak havoc and cause harm to groups who he feels oppose him and his beliefs. A black hat typically breaks into a network in order to obtain information that will allow him to commit fraud or theft. A white hat may commit the same hacking acts as other hackers, but is not motivated by a malicious intent. A script kiddie uses hacking software in order to break into someone else's computer system. This software is usually obtained from another hacker who has figured out how to corrupt that specific program's system.
Features: Most hackers are talented computer programmers. They know how to write software and how to remove the kinks from other programs that are written by the hacking community. The most important feature of someone who hacks, however, is the "hacker mindset," a set of beliefs that the hacker community has established. The core belief is that it is OK to hack into someone else's computer and to obtain, distribute or otherwise exploit any information that may be found in the process. Hackers usually strongly believe in their First Amendment rights and believe that hacking falls under this umbrella.

Unknown said...

group 17
gopal.suresh kumar
jayesh narani
krishna mohan chowdary

Hackers are highly skilled computer gurus who break into computer systems for a variety of reasons, from financial gain to just for the fun of a challenge. Despite these activities being illegal, the hacker community has maintained momentum for decades and shows no signs of slowing down.

Function: Hacking is an activity that is engaged in by people who use their knowledge of the internet, computers, firewalls and security preferences to break into other people's computers, allowing them to view private information, alter data and steal files, information or programs. MySpace pages, software applications and email accounts are the most common programs that are hacked into. Hackers typically look for passwords or credit card information. Some will simply hack into these programs in order to change information, such as a screen name, password or other content that is written by the owner.

Significance: Hackers are sometimes motivated by greed and steal personal information in order to take on someone's identity for their own gain, or in politics, where they try to exploit, blackmail or otherwise expose someone in power, or even just for entertainment, where hackers simply want to see what they are capable of doing. These types of hackers usually brag about their conquests on message boards or instant messaging programs, competing with fellow hackers as to who is the best among them.
History: The first case of hacking occurred in the 1960s when a group of students at the Massachusetts Institute of Technology (MIT) tried to access the school's main computing systems. In the 1970s, "phone phreaks" hacked into telephone networks and made toll-free calls. Mainstream computer hacking as we know it today gained momentum in the 1980s when hackers broke into what would now be considered message boards. Congress passed the Computer Fraud and Abuse Act in 1986, which made it illegal for anyone to break into anyone else's computer system. Despite the law, the 1990s saw the invention of the Trojan Horse, which allowed hackers to access any computer that downloaded the program. Many companies were hacked into as well, such as AOL, Yahoo!, Amazon and eBay.
Types: There are at least five main types of hackers. A hacktivist uses his hacker skills in order to broadcast a political message on the Internet. A cyberterrorist commits acts out of a desire to wreak havoc and cause harm to groups who he feels oppose him and his beliefs. A black hat typically breaks into a network in order to obtain information that will allow him to commit fraud or theft. A white hat may commit the same hacking acts as other hackers, but is not motivated by a malicious intent. A script kiddie uses hacking software in order to break into someone else's computer system. This software is usually obtained from another hacker who has figured out how to corrupt that specific program's system.
Features: Most hackers are talented computer programmers. They know how to write software and how to remove the kinks from other programs that are written by the hacking community. The most important feature of someone who hacks, however, is the "hacker mindset," a set of beliefs that the hacker community has established. The core belief is that it is OK to hack into someone else's computer and to obtain, distribute or otherwise exploit any information that may be found in the process. Hackers usually strongly believe in their First Amendment rights and believe that hacking falls under this umbrella.

rohit rajora said...

A Hacker is a skilled computer user. The term originally denoted a skilled programmer particularly on skilled in machine code and with a good knowledge of the machine and its operating system. It is a fact that a good programmer could always hack an unsatisfactory system around until it worked.
in common usage, a hacker is a person who breaks into computers, usually by gaining access to administrative controls.The subculture that has evolved around hackers is often referred to as the computer underground. Proponents claim to be motivated by artistic and political ends, and are often unconcerned about the use of illegal means to achieve them.
Other uses of the word hacker exist that are not related to computer security but these are rarely used by the mainstream media