FrÃ¼her waren Hackerangriffe Einzeltaten von Cyberpunks, die nach Ruhm und Anerkennung in der Szene strebten. Die Entwicklung geht jedoch dahin, dass die Hacker von staatlichen Stellen gezielt zur Informationsgewinnung oder zur StÃ¶rung der Infrastruktur in anderen Staaten eingesetzt werden. Das Recht steht hier vor groÃŸen Herausforderungen. ZunÃ¤chst ist dabei das Computerstrafrecht zu untersuchen. Welche PhÃ¤nomene werden erfasst? Sind diese Normen rechtsstaatlich tragfÃ¤hig? Weiterhin werden die Fragen gestellt, welche Entwicklungen rechtstatsÃ¤chlich zu erwarten sind und wie auf diese Herausforderungen reagiert werden kann und soll. Als AufhÃ¤nger dient dabei der Film "23 – Nichts ist so wie es scheint". Dieser Film behandelt den sog. KGB-Hack in den 1980er-Jahren. Dieses Ereignis war zum einen einer der Ausgangspunkte bei der Entwicklung des Computerstrafrechts. Zum anderen zeichnete sich schon damals die Entwicklung ab, dass Geheimdienste die Hacker fÃ¼r sich nutzbar machen wollen und kÃ¶nnen.
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century’s signature form of organized crime.
The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.
Continue reading “Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground”
This definitive reference resource on cyber warfare covers all aspects of this headline topic, providing historical context of cyber warfare and an examination its rapid development into a potent technological weapon of the 21st century.
• Provides comprehensive coverage of the major individuals, organizations, impacts, and issues related to cyber warfare that enables readers to better understanding of the impact of cyber warfare on modern conflicts
Continue reading “Encyclopedia of Cyber Warfare”
Cybercrime has recently experienced an ascending position in national security agendas world-wide. It has become part of the National Security Strategies of a growing number of countries, becoming a Tier One threat, above organised crime and fraud generally. Furthermore, new techno-social developments in social network media suggest that cyber-threats will continue to increase. This collection addresses the recent 'inertia' in both critical thinking and the empirical study of cybercrime and policing by adding to the literature seven interdisciplinary and critical chapters on various issues relating to the new generation of cybercrimes currently being experienced. The chapters illustrate that cybercrimes are changing in two significant ways that are asymmetrical. On the one hand cybercrime is becoming increasingly professionalised, resulting in ’specialists’ that perform complex and sophisticated attacks on computer systems and human users. On the other, the ‘hyper-connectivity’ brought about by the exponential growth in social media users has opened up opportunities to ‘non-specialist’ citizens to organise and communicate in ways that facilitate crimes on and offline. While largely distinct, these developments pose equally contrasting challenges for policing which this book addresses.
This book was originally published as a special issue of Policing and Society.
People are checking their e-mails, surfing over the Internet, purchasing goods, playing online games, paying bills on the Internet everyday. However, while performing all these tasks, how many people think about security? Do they know the risks of being attacked, infected by malicious software? How many users are aware of that their computer may be used as zombie machines to target other victim systems? As technology is growing rapidly, newer attacks are appearing. Security is a key point to get over all these issues. In this thesis, we will make a real life scenario, using honeypots. Honeypot is a well designed system that attracts hackers into it. By luring the hacker into the system, it is possible to monitor the processes that are started and running. In other words, honeypot is a trap machine which looks like a real system in order to attract the attacker. The aim of the honeypot is analyzing, understanding, watching and tracking hacker’s behaviours in order to create more secure systems. Honeypot is also very useful for future threats to keep track of new attacks.