Skip to main content Accessibility help
×
Hostname: page-component-5c6d5d7d68-wtssw Total loading time: 0 Render date: 2024-08-06T22:25:51.851Z Has data issue: false hasContentIssue false

3 - Hackers

Published online by Cambridge University Press:  05 July 2013

Gráinne Kirwan
Affiliation:
Dun Laoghaire Institute of Art, Design and Technology, Dublin
Andrew Power
Affiliation:
Dun Laoghaire Institute of Art, Design and Technology, Dublin
Get access

Summary

Case studies

Former hacker Kevin Mitnick has made a career from advising on computer security and has authored a number of books on hacking, with a particular focus on social engineering methods (see, for example, Mitnick and Simon, 2002, 2005). He has admitted to breaking into the computer systems of several organisations, including the University of Southern California, Motorola, Fujitsu and Sun Microsystems. He used a variety of methods of infiltration, including social engineering, where he impersonated employees of some of the companies he victimised. He was sentenced to almost four years in prison, along with severely restricted access to computers for a further three years (US Department of Justice, 1999).

Adrian Lamo has also experienced a lot of publicity due to his hacking activities. His attempts to improve the security of firms led to mixed responses from the companies involved – some were highly appreciative of his efforts, while others filed lawsuits against him (see Mitnick and Simon, 2005). Probably his most famous hack involved infiltrating the New York Times private network and using their subscription to the search tool Lexis-Nexis, although he has had many other interesting hacking experiences (Kahn, 2004). More recently, Lamo has been in the news for turning in US military analyst Bradley Manning, after Manning reputedly ‘boasted’ to him about passing on confidential information to whistle-blowing website Wikileaks (BBC News Online, 7 June 2010).

Type
Chapter
Information
Cybercrime
The Psychology of Online Offenders
, pp. 51 - 78
Publisher: Cambridge University Press
Print publication year: 2013

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×