Friday, April 9, 2010

Effectiveness of Computer Hacking Laws.

Like any other law, the effectiveness must be determined by its deterrence. While there will always be those that want to see if they can do it, and get away with it (any crime), there are always the many more who may not do something if they are aware of its unlawfulness - and possible imprisonment.

In the early 1990's, when hacker efforts stopped AT&T communications altogether, the U.S. Government launched its program to go after the hackers. This was further stepped up when government reports (by the GAO) indicate that there have been more than 250,000 attempts to hack into the Defense Department computers. First there were the laws - now came the bite behind it. One of the effects of computer hacking brought about focused efforts to catch them and punish them by law.

Then, more recently, the U.S. Justice Department reveals that the National Infrastructure Protection Center has been created in order to protect our major communications, transportation and technology from the attack of hackers. Controlling teens and hackers has become the focus of many governmental groups to stop this maliciousness against individuals, organizations, and nations.

Defining cyber crime.

Hacking has a rather simple definition to it. Basically it is defined as the unauthorized use of a computer - especially when it involves attempting to circumvent the security measures of that computer, or of a network.

Hacking is not difficult to learn. Unfortunately, it may be too easy for someone that has a little time on his hands. This becomes especially obvious when it is found that a number of the hackers, at least those that are caught, are often only in their teens.

Beyond this, there are two basic types of hacking. Some only hack because they want to see if they can do it - it is a challenge to them. For others, however, it becomes an attack, and they use their unauthorized access for destructive purposes. Hacking occurs at all levels and at all times - by someone, for some reason. It may be a teen doing it to gain peer recognition, or, a thief, a corporate spy, or one nation against another.

Are computer hacking laws really working?

Someone's identity was stolen. It happened again. You might even know of someone that had it happen to them. We often hear of percentages - and they are surprisingly high.

Enforcement is taking place, but we have to wonder if computer hacking laws are really having any effect against cyber hacking. This article will show what is being done against cyber crime.

internet hacking crime.

Croll did not do anything malicious with the accounts he hacked. Other than looking at the information they contained he just took screen captures and posted them on the Internet. No tweets were ever made from them. His reason was apparently to just overcome the challenge of gaining access.
Currently awaiting trial on June 24th he has yet to find a lawyer. At a maximum he could be fined $40,000 and forced to serve two years in prison.
Police in France have arrested the man behind a host of Twitter account hacks including high-profile targets Barack Obama and Britney Spears.

His real name has not been released, but we do know he is 25-years-old, is unemployed, currently lives with his parents in Puy-de-Dome, and went by the hacker name of “Hacker Croll”. He has no formal computer training, instead gaining access to the accounts by pretending to be a site administrator and guessing the passwords through information gathering.
The hacks were carried out in April last year and Croll’s capture required a joint effort between the FBI and the French authorities. He was caught when the attacks were traced to France by the FBI and a further joint investigation commenced.

internet hacking crime

Obama Twitter account hacker facing $40,000 fine, jail term Read more: http://www.geek.com/articles/news/obama-twitter-account-hacker-facing-40000-fine-jail-term-20100325/#ixzz0kcDn0BEn

Welcome Coursemates

Hi guys, I would like to invite you all to join my blog. Feel free to drop comment or any idea here that we can share together.