Hacking history, ethics & dark web
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following best describes a core tenet of the hacker ethic as defined by Steven Levy?

  • Promoting complete transparency and unrestricted access to information. (correct)
  • Prioritizing profit and personal gain through technological exploitation.
  • Restricting computer access based on user credentials and corporate hierarchy.
  • Upholding authority and centralizing control over digital resources.

How did the advent of personal computing, driven by microchip technology, change the landscape of hacking?

  • It centralized hacking activities within large corporations, limiting individual involvement.
  • It made hacking exclusively a tool for government agencies, increasing national security.
  • It decreased the overall prevalence of hacking due to enhanced security measures on personal devices.
  • It shifted hacking focus from corporations to individuals, enabling attacks on personal computers. (correct)

What was the most significant impact of the internet's rise in the 1990s on hacking activities?

  • It led to a decline in the computer security industry because of fewer security threats.
  • It created new avenues and methods for hacking, coinciding with the criminalization of hacking. (correct)
  • It decreased the number of hacking incidents due to enhanced digital security protocols.
  • It restricted hacking activities to government entities and large corporations.

In the context of the early hacker community, what characterized its relationship with mainstream culture?

<p>An opposition to authority, influenced by the punk culture. (B)</p> Signup and view all the answers

How did the advent of automated hacking tools affect the landscape of cyber security in the 2000s?

<p>It effectively eliminated the need for specialized hacking skills, enabling more individuals to engage in malicious activities. (B)</p> Signup and view all the answers

Which trend became increasingly prominent in the 2000s related to hacking activities?

<p>A shift towards hacking motivated by political and ideological reasons. (B)</p> Signup and view all the answers

What is a key distinction used to define who is considered a 'hacker' within the community?

<p>Technical skill and cultural alignment. (D)</p> Signup and view all the answers

Which of the following is NOT a typical characteristic associated with activities on the Dark Web?

<p>Strict regulation by search engines like Google. (B)</p> Signup and view all the answers

What was the primary purpose of the 'Cult of the Dead Cow' organization within the context of hacking history?

<p>To contribute to government efforts, some members securing positions within the US government. (D)</p> Signup and view all the answers

How does the Onion Router (Tor) enhance user anonymity?

<p>By routing traffic through multiple layers of encryption and relays. (D)</p> Signup and view all the answers

How do illicit markets on the Dark Web attempt to ensure the secure delivery of products?

<p>By disguising packages to avoid suspicion and leveraging security/privacy rights. (B)</p> Signup and view all the answers

Which factor primarily complicates the tracking of financial transactions in Dark Web markets?

<p>The prevalent use of cryptocurrencies obscures transaction details. (B)</p> Signup and view all the answers

What is a key difference between copyright infringement via copy sharing and fraud involving cyber technologies?

<p>Copyright infringement primarily involves intellectual property, while cyber fraud involves deception for financial gain. (A)</p> Signup and view all the answers

A person pays for a service online, but the service provided is substandard. What kind of crime is this?

<p>Online Fraud. (B)</p> Signup and view all the answers

A cybercriminal gains unauthorized access to a company's financial database and steals sensitive customer information, which is then sold on the dark web. Which types of illicit markets are directly involved in this scenario?

<p>Hacker services and illicit information markets. (B)</p> Signup and view all the answers

Besides financial losses, what other risks are associated with purchasing products from Dark Web markets such as the Silk Road?

<p>Risk of receiving subpar goods and potential law enforcement intervention. (A)</p> Signup and view all the answers

Which of the following is the MOST accurate distinction between hacktivism and cyber terrorism?

<p>Hacktivism is clearly defined by its political motivations, whereas cyber terrorism's political objectives are less distinct. (B)</p> Signup and view all the answers

Which of the following examples BEST illustrates a 'crime using the machine' as it relates to cybercrime?

<p>Gaining unauthorized access to a database and stealing personal information for identity theft. (D)</p> Signup and view all the answers

How has e-commerce MOST significantly changed financial transactions in the 21st century?

<p>It has introduced entirely new methods for conducting financial transactions previously unavailable. (C)</p> Signup and view all the answers

Which of the following activities falls under both 'crimes using the machine' and relates to 'illegal goods and illicit markets'?

<p>Using a computer to create and distribute counterfeit currency. (A)</p> Signup and view all the answers

A threat actor gains unauthorized access to a company's database. Which of the following actions would be MOST representative of exploiting this access for financial crimes within illicit markets?

<p>Selling stolen credit card numbers from the database on a dark web marketplace. (D)</p> Signup and view all the answers

How do illegal goods and illicit markets primarily target individuals as victims in the context of cybercrime?

<p>By tricking individuals into unintentionally purchasing illegal products or services. (A)</p> Signup and view all the answers

What is one of the MOST important distinctions about content found on the surface web versus the deep web?

<p>Content on the surface web is indexed by search engines, while the deep web is not easily discoverable. (D)</p> Signup and view all the answers

How might bomb-making instructions available online pose a complex problem that intersects with both freedom of information and public safety?

<p>Restricting access to such information could infringe on the right to information but allowing it could endanger public safety. (D)</p> Signup and view all the answers

Flashcards

Personal Computing Era

Refers to the period when personal computers became common in homes.

Hacking Target Shift

Hacking shifted from targeting corporations to targeting individuals.

Hacker Underground

An underground group that was associated with the punk culture and engaged in hacking activities from their homes.

Hacker Ethics

A set of principles that emphasize unlimited access to computers, free information, and decentralization.

Signup and view all the flashcards

Internet Impact on Hacking

The internet's rise led to new hacking methods and opportunities.

Signup and view all the flashcards

Criminalization of Hacking

Hacking was increasingly treated as a criminal activity, leading to legal consequences.

Signup and view all the flashcards

Computer Security Community

The creation of jobs and opportunities related to defending computer systems against attacks.

Signup and view all the flashcards

Ideological Hacking

Hacking became driven by political motivations, such as spreading messages or disrupting systems.

Signup and view all the flashcards

Digital Piracy

Unauthorized copying and distribution of copyrighted material, often for entertainment or financial gain.

Signup and view all the flashcards

The Onion Router (Tor)

A network providing encrypted, anonymous communication, often used to access the dark web.

Signup and view all the flashcards

Dark Web Markets (Cryptomarkets)

Online marketplaces on the dark web that facilitate the buying and selling of illicit goods and services, often using cryptocurrency.

Signup and view all the flashcards

The Silk Road

A well-known dark web market known for selling illegal products.

Signup and view all the flashcards

Cyber Fraud

Acquisition of money or property from victims using deception or cheating online.

Signup and view all the flashcards

Ghosting in Cyber Fraud

When offenders get money or service, but they aren't good services

Signup and view all the flashcards

Dark Web Weapon Markets

Illicit weapons like 3D-printed guns are illegally traded.

Signup and view all the flashcards

Counterfeit Goods

Fake brand items sold to consumers looking for genuine products.

Signup and view all the flashcards

Hacktivism

Hacking driven by political or social objectives.

Signup and view all the flashcards

Cyber Terrorism

Using hacking to cause disruption or harm to advance political or ideological goals.

Signup and view all the flashcards

Crimes Using the Machine

Crimes where a computer is used to exploit victims after unauthorized system access.

Signup and view all the flashcards

Examples of Crimes Using the Machine

Fraud or theft committed after a hacker gains access to a system.

Signup and view all the flashcards

E-commerce

Financial transactions facilitated via the internet.

Signup and view all the flashcards

Illicit Markets

The trading of illegal or prohibited items and services online.

Signup and view all the flashcards

Examples of Illicit Goods

Selling narcotics, child exploitation material, or bomb-making guides.

Signup and view all the flashcards

Surface Web

The portion of the internet accessible through standard search engines.

Signup and view all the flashcards

Study Notes

  • Cyber Society began on Tuesday, February 11, 2025, at 9:47 AM

The Internet

  • Network of interconnected computers enabling the sharing of information
  • Origins:
    • 1950s: Sage
    • 1960s: DARPA and ARPANET
    • 1990s: Popular and communication internet
  • Technology revolutionizes communication
  • Face-to-face interaction has been altered significantly
  • Without the internet, cybercrime would not exist
  • Initially a military tool and radar system
  • Advanced communication: AT&T was offered ownership in 1970
  • Emerged in 1990
  • Internet Explorer launched in 1995
  • Chrome is a browser, not the internet itself
  • Internet penetration rate (2019):
    • 57% worldwide
    • 89% in North America
    • 87% in Europe
  • The internet provides access to information worldwide
  • Smartphones, with 70% penetration in North America, have made internet access increasingly mobile
  • Access to the internet is faster and more convenient via smartphones
  • The UN declared internet access a human right

Internet Impact

  • Economic impact:
    • New forms of crime
    • Theft of information, including credit cards
  • Political impact:
    • A primary source of information
    • Platforms like TikTok and Instagram play a significant role
  • Risks and concerns:
    • The spread of fake news
    • The propagation of racism
  • Social changes:
    • Digital goods are now commonplace
    • Declining newspaper readership
    • Increased online hate-fueled cybercrime
    • Primary interactions are now online

Internet Depth

  • Surface web:
    • Freely accessible via links
    • Google is an example
  • Depp web:
    • Easily accessible content
    • Requires research to navigate
  • Dark web:
    • Requires specific search engines and VPNs
    • Used for illegal activities, including child exploitation

Features of Society since the 2000s

  • Perpetual contract:
    • Constant communication
    • Reduced privacy and isolation
    • The traditional 9-to-5 workday is becoming obsolete
  • Data performance:
    • Activities are documented online, creating a digital footprint and records
  • Immediate access:
    • Instant purchasing and information retrieval
    • Risk of misinformation
  • Mass participation:
    • Virtual participation in movements with online donations
    • Potential for negative impacts
    • Increased freedom of speech alongside increased hate

Citizens of Our Society

  • Digital natives:
    • Born after 1980s
    • Have always had access to computers
  • Digital immigrants:
    • Experience stress due to evolving internet privacy
    • Varying access to the internet leads to diverse experiences and skills
    • Limited opportunities, such as online classes or dating
  • Digital divide:
    • Disparities in access, skill, and opportunity
    • 40% lacking internet access are disadvantaged
    • Transitioning and spreading overtime
    • Influenced by cost

Technological Unconsciousness

  • Defined as a tendency to undervalue, ignore, or take for granted the pervasive influence of technology
  • Overlooks technology's role and assumes its neutrality
  • Popular culture tends to ignore the internet's massive impact
  • Technology is often taken for granted
  • Lives have changed due to technology
  • Texting affects communication styles
  • Wikipedia's information can be heavily influenced by politics

Cyberpunk Science Fiction

  • Involves cyber, cyberspace, and cyberpunk novels
  • Popularized by Neuromancer (1984)

Hacker Movies

  • Common themes:
    • War games
    • Tron
    • The Net
    • Snowden
  • Often focus on high technology and less quality of life
  • Raises questions about the effect of technology on the human body

Defining Cybercrime

  • Technical definition: Criminal activities that exploit technology
  • Legal definition: Unlawful acts that utilize technology
  • It can be difficult to make legal definitions
  • Deviant behavior utilizing technology to commit acts deemed harmful or illegal by society

New Cybercrime Features

  • Cybercrime is new and unique
  • Makes crimes anonymous with unknown perpetrators
  • Cybercrime takes place with unknown geographical locations
  • Cybercrime is often anonymous, unlike physical crimes with traceable locations
  • Fraud can occur across borders, making it difficult for police to address

Types of Cybercrime

  • Crimes against the machine (computer integrity crimes)
    • e.g., Hacking
  • Crimes using the machine (computer-enabled crimes)
    • e.g., Catfishing
  • Crimes in the machine (computer content crimes)
    • e.g., Creation and spread of murder

Recent Cybercrime Rates

  • Canadian rate (2022): 191/100k, doubled since 2018
  • Canadian Internet Use Survey (2022): 70% of Canadians reported experiencing cyber security incidents, a 12% increase

Overdramatization of Cybercrime

  • Sensational media (Churnalism) can be overdramatic
  • Problems with data arise
  • Growing incidence affecting more people
  • Over exaggerating data
  • Risks with Fake news
    • Mainstream media
    • Journalism
  • Constant and immediate media coverage
  • Concept of Moral panic due to media driving news and content

Cybercrime Victim Targets

  • Individuals
  • Organizations
  • Nation states
  • It has the potential to ruin a nations organization

Key Takeaways

  • Cybersociety
    • The internet has changed political, social, and economic elements
  • Technological Unconsciousness
  • Ignoring how technology impacts elements of society
  • Cyber Crime: the internet has enabled various new forms of crime

Hackers and Hacking

  • Popular perception:
    • Fear, often rooted in technophobia
    • Concerns about unforeseen harms, like those in Frankenstein (1818)
  • Media representation:
    • Hacker movies like WarGames (1983)
    • TV series such as Mr. Robot (2015)

Crimes Against the Machine

  • Unauthorized breach of a computer system
  • Hacking as "breaking and entering"
  • Themes include breaking and entering, trespassing on networks, and damaging digital property

What is Hacking?

  • Unauthorized access to digital spaces belonging to others
  • It's a digital break-in with the goal of breach and access
  • Targets: individuals, corporations, or governments

Methods of Hacking

  • Social Engineering: manipulating individuals to give up information

History of Hacking

  • 1950s: MIT engineering students use "hacker" for playful tinkering with electronics
    • Around engineering students
  • Technical Model Railroad Club
  • Telephone Phreaking
  • 1980s: Hacking grew in popularity, especially amongst middle-income families
  • Personal Computing allowed families have computers at home
  • It became used beyond hacking corportations, and targeting people one on one
  • Hacking undergound started here
  • Hacking at home
  • The culture was punky and apart of punk culture

Hacker Ethics

  • Access to computers should be unlimited
  • All information should be free, and authority should be mistrusted
  • Hackers should be judged by their skill in hacking
  • Creating art and beauty on a computer
  • Computers improve lives and go against big corporations and governments

Changing Landscape

  • 1990s: the rise of the internet expanded hacking opportunities
  • Hackers had new ways to hack
  • Includes Criminalization of hacking, jobs in computer security, and other organizations 2000’s- Hacking grows, tools advances, and politics become central
  • Hacking becomes automated and rise of state-sponsored Hacking

The Hacker Community

  • Debates between skill and culture
  • There are studies on factors like age, gender, race, and location
  • Younger average age in Digital spaces

Key Hacker Terms

  • Technology known with nicknames
  • Knowledge is gained through competitions
  • Secrecy is kept through nicknames and message boards

Hacking Ethics

  • Unethical hackers use black hats and steal credit cards for financial gain
  • Ethical “white hat” hackers test security
  • There are also shades of grey hats between the two extremes
  • Cyber spies work for different entities to reach set goals
  • Many hack for motivations or for the thrill of the craft

Common Hacking Tactics

  • Hacking includes theft of computer resources
  • Using unauthorized access
  • Finding and taking advantage to vulnerabilties
  • There are theft of computer resources when it comes to breaking into wifi
  • Theft of computer data includes theft of images and videos

Types of Data Breaches

  • Various techniques like:
    • System Alteration:
    • Evasion
    • Personal advantage
    • Nefarious damage
    • Nation state purposes
    • Website Defacement and Spoofing
  • Denial of Service

Malware

  • Input or spread malicious software, such as a virus
  • Exists in various forms with various prevalance
  • Trojan
  • Bots
  • Ransomware
  • Hackers attack financial and political organizations

Legislative Responses

  • Change in approach by creating new laws
  • Examples in legislative
  • Counterfeit Access laws
  • Criticisms of new laws for being too lenient

Hacktivism & Cyber Terrorism

  • Internet and Politics:
    • Governments can now post and spread awareness via Internet
    • Citizens are now able to view crime rates, and vote online- but may be hard due to hacking
    • Now you can express concerns online- but be warry of misinformation and rumors
    • Now social movements can use social media

What is Hacktivism

  • Hacktivism: unauthorized accessing of digital spaces that belong to others
  • Crimes that use the machine to aim their target
  • Politcal Hacking uses targets such as political processes, organizations, governments/states
  • Such as the 2016 Pizzagate with Russain Hackers that involved Hilary’s reputation and emails

Advantages of Hacktivism

  • Hacktivism is not physical
  • Advantages is the online tools that are use to assist hacking
  • Can be traced with attacks corporations such as using tools. Can be used to troll vigilantes

Hacktivism Tactics

  • EU Website hack: EU Presidency website was hacked in 2010.
  • Whistleblowing by bringing awareness
  • Can have legal debate for regulation due to lack of accountability

What is Cyber Terrorism?

  • Exploitation of cyber vulnerabilities
  • Uses digital infrastructure
  • Cyber Terrorism uses distance and smaller agents
  • There is anonymity and laws that can't be used

Computer Assisted Terrorism

  • Propaganda
  • Gathering information
  • Financing
  • Lack Privacy

Cyber Terrorism and Media use rhetoric

  • Media Rhetoric can be used by terrorism
  • Can cause risks due to the use of footprints

Keys Lessons

  • Hacking is political, is sometimes infromed by political goals
  • Range of computer assisted tactics, where they spread propaganda

Illegal Goods and Illicit Markets

  • This involves the crimes using computers
  • System, once the offender has excess
  • Breaking into system
  • Stealing data or stealing from computers
  • Rise of E- Commerce online to allow engagement
  • Internet has been used for drugs, guns, bombs etc
  • Is part of social, what drives individuals to seek this material
  • Types of crimes: Machine + Digital Dependent
  • Markets plus Business and Individuals

Levels on the Web

  • Surface Level- is a basic level of internet browsing
    • Restrictions
  • Deep web requires links for certain websites
    • No Google
  • Dark Web involves VPN
    • Sell drugs, weapons
    • Can occur across all webs in different ways

What happens in the web

  • Sell of Illegal drugs
  • Medical drugs regulated
  • Easy to access
  • Markets for illegal goods
  • Hackers and cyber crime
  • Money and attacks of services
  • Is illegal- what products that can be used to deliver material
  • Involves hacking info

Theft and Frauds

  • Financial losses
    • Victims on fraud
    • Technologies involve frauds such as online ghosting

Identity Theft

Pre cyber society and fraud

  • Information in people’s documents online
  • Tabnapping and Spyware
  • Fraud, Credit, Economic
  • Can be compromised due to online services online

Types of Online Frauds

  • Phishing- via emails
  • Romance Fraud
  • Advanced Fee Fraud

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Explore the evolution of hacking, from its ethical roots to the rise of cybercrime. Understand core tenets, the impact of technology, and the dark web. Learn about hacker culture.

More Like This

Hacker vs
5 questions

Hacker vs

LovableInspiration avatar
LovableInspiration
The Hacker Ethic and Security Evolution
40 questions
Use Quizgecko on...
Browser
Browser