The Forum Site - Join the conversation
Forums:
Technology & Internet

Cybersecurity: Offensive/Defense

Reply to Topic
AuthorMessage
Pages: << · 1 2 3 4 · >>
chaski On April 19, 2024
Stalker





Tree at Floydgirrl's Window,
#31New Post! Aug 02, 2014 @ 15:21:34
@Dredd Said


...why not have a set of procedures in place to deal with sites publishing stolen information?




They do.

Just one of many examples (in the USA) is Title 18 Section 2703 (aka Electronic Communications Privacy Act)
chaski On April 19, 2024
Stalker





Tree at Floydgirrl's Window,
#32New Post! Aug 02, 2014 @ 15:30:25
BTW

It would be fairly easy (we have the technology) to send an electronic impulse (I am way over simplifying this) down stream and fry a hacker's computer.

So, network security types see the hack (or the trail of the hack) and send an electronic impulse back down the trail and destroy the hard drive of the hacker.

There are a few problems with this.

1. This electronic impulse might also damage or destroy every computer in the stream. So one can imagine a scenario where a hacker went through a couple banks networks, a few business networks, some university networks, then "attacked" a government facility.... and the response could take out the computers of the banks, businesses, universities... not the best idea.

2. It is so easy for hackers to just get new computers and start again, so frying their computers has very limited value.

A legal investigation that catches a hacker and puts him/her in jail has more long term results.
Hypnotica On October 08, 2023

Banned



Steel City (Sheffield), United
#33New Post! Aug 02, 2014 @ 15:35:38
@chaski Said

BTW

It would be fairly easy (we have the technology) to send an electronic impulse (I am way over simplifying this) down stream and fry a hacker's computer.

So, network security types see the hack (or the trail of the hack) and send an electronic impulse back down the trail and destroy the hard drive of the hacker.

There are a few problems with this.

1. This electronic impulse might also damage or destroy every computer in the stream. So one can imagine a scenario where a hacker went through a couple banks networks, a few business networks, some university networks, then "attacked" a government facility.... and the response could take out the computers of the banks, businesses, universities... not the best idea.

2. It is so easy for hackers to just get new computers and start again, so frying their computers has very limited value.

A legal investigation that catches a hacker and puts him/her in jail has more long term results.


I think you would just fry the local exchange. DOnt quote me on that.
CHeap way of upgrading your phone lines though.
COnnect the two wires together (years since Ive wired a phone line so cant remember which two wired it is).

One of the wired is live, that sends the current down the phone line. And burns out the exchange. BT or Virgin, then build a new echange, lay a new line, with the fastest speed.

Obviously everyone on your street will be pissed.
Hypnotica On October 08, 2023

Banned



Steel City (Sheffield), United
#34New Post! Aug 02, 2014 @ 15:36:38
@chaski Said

The them in your sentence is not necessarily cyber criminals using the internet.

It is more likely that they are non-cyber criminals using hacker techniques that down load information to flash drives or CD and then send the information to Wikileaks.


Yeah true. But again, without wikileaks will they still have the incentive to do so?
Hypnotica On October 08, 2023

Banned



Steel City (Sheffield), United
#35New Post! Aug 02, 2014 @ 15:37:34
@chaski Said



2. It is so easy for hackers to just get new computers and start again, so frying their computers has very limited value.



And there is the cloud as well. Plus its quite easy to get a virtual machine somewhere and remotley access it and upload info to it.
someone_else_again On May 20, 2021
Really. Not a dude.





, Washington
#36New Post! Aug 02, 2014 @ 16:59:48
Glad that was solve while I was away. I feel like I just watched an episode of Scooby Doo.
chaski On April 19, 2024
Stalker





Tree at Floydgirrl's Window,
#37New Post! Aug 02, 2014 @ 17:05:19
@someone_else_again Said

Glad that was solve while I was away. I feel like I just watched an episode of Scooby Doo.



Really?

Is that what you were doing when you were away?
someone_else_again On May 20, 2021
Really. Not a dude.





, Washington
#38New Post! Aug 02, 2014 @ 17:12:50
@chaski Said

Really?

Is that what you were doing when you were away?



No but I got that feeling.
chaski On April 19, 2024
Stalker





Tree at Floydgirrl's Window,
#39New Post! Aug 02, 2014 @ 17:23:50
@someone_else_again Said

No but I got that feeling.



Yes.

Whenever people discuss cyber security I feel like I have been in a cartoon about a talking dog.
someone_else_again On May 20, 2021
Really. Not a dude.





, Washington
#40New Post! Aug 02, 2014 @ 17:32:40
@chaski Said

Yes.

Whenever people discuss cyber security I feel like I have been in a cartoon about a talking dog.


Glad I'm not the only one.
Electric_Banana On April 24, 2024




, New Zealand
#41New Post! Aug 02, 2014 @ 23:12:00
I believe both the NSA and Wikileaks are a necessary evil and keep one another in check.

I think there should be much stricter laws against hacking in general however targeting unofficial intelligence groups like the NSA or Wikileaks.

Laws more proactive against hacking than those against piracy.

Hacking can sabotage others on an individual basis; bullying and destroying a person's lucrative efforts are the first two crimes which come to mind. Novels & games in progress (not yet backed up) can be destroyed or easily plagiarized and sold to large development teams who can race the intellectual property to completion before the original author can manage to get their work copyrighted.
Hypnotica On October 08, 2023

Banned



Steel City (Sheffield), United
#42New Post! Aug 05, 2014 @ 09:24:05
@Electric_Banana Said



Laws more proactive against hacking than those against piracy.


The truth of the matter is that it is easier said than done.
Sure Script Kiddies can probably be traced more easily, but they dont really know what they are doing, they just download files and run them, to be fair some of the software avaliable online for free is quite effective.

But if you get a Grey Hat or Black Hat who knows what they are doing and actually of knowledge of Operating Systems, Servers and Networking, they are going to be harder to trace, if they are actually detected.

At the end of the day, any computer system is designed and implemented by a human being. White Hat or White Hat does not take into account knowledge or skill, it is jut a statement really of are you a force for good or a force for bad.

Ironically, a lot of the skilled White Hats used to be Black Hats.
chaski On April 19, 2024
Stalker





Tree at Floydgirrl's Window,
#43New Post! Aug 05, 2014 @ 13:37:11
@Hypnotica Said

The truth of the matter is that it is easier said than done.
Sure Script Kiddies can probably be traced more easily, but they dont really know what they are doing, they just download files and run them, to be fair some of the software avaliable online for free is quite effective.

But if you get a Grey Hat or Black Hat who knows what they are doing and actually of knowledge of Operating Systems, Servers and Networking, they are going to be harder to trace, if they are actually detected.




How is this different from any other criminal activity?

PS
It really isn't that hard to track Black Hats. As with all criminal investigations, it just takes time.

Black Hats get caught on a regular basis.
Hypnotica On October 08, 2023

Banned



Steel City (Sheffield), United
#44New Post! Aug 05, 2014 @ 14:01:53
@chaski Said

How is this different from any other criminal activity?

PS
It really isn't that hard to track Black Hats. As with all criminal investigations, it just takes time.

Black Hats get caught on a regular basis.



I dunno to be honest. I was watching a documentry and it actually stated that a lot of cyber crime goes un reported. If abig company admits it was hacked, it is going to lose stock value. Also the Sys Admin would have to admit that they messed up.

And then I dont know if you have ever been on TOR, deepweb, darknet, whatever you want to call it, but things like Credit Card Numbers are currency.

There are a lot of Botnets out there, being utilised for various tasks and roles, which have not been shut down, nor have the creators and controllers been apprehended.
chaski On April 19, 2024
Stalker





Tree at Floydgirrl's Window,
#45New Post! Aug 05, 2014 @ 14:39:55
@Hypnotica Said

I dunno to be honest. I was watching a documentry and it actually stated that a lot of cyber crime goes un reported. If abig company admits it was hacked, it is going to lose stock value. Also the Sys Admin would have to admit that they messed up.

And then I dont know if you have ever been on TOR, deepweb, darknet, whatever you want to call it, but things like Credit Card Numbers are currency.

There are a lot of Botnets out there, being utilised for various tasks and roles, which have not been shut down, nor have the creators and controllers been apprehended.


Yes. Lots of cyber crime goes unreported.

To put it in perspective;

In the USA: "More than half of the nation’s violent crimes, or nearly 3.4 million violent victimizations per year, went unreported to the police between 2006 and 2010, according to a new report published by the Bureau of Justice Statistics (BJS)."

But, sticking with hacker related activity. Essentially there are:

1. Computer viruses (which are really very much different from hacking). When most people say that their email was "hacked" typically it was not actually "hacked". They just down loaded a virus. Sometimes it is a bot that collects specific data... but normally it is not a true "hack". It may or may not be illegal and if illegal may or may not result in a prosecution... it depends on the specifics of the virus.

2. electronic/computer scanning of networks, which (in the USA) is almost never a crime;

3. electronic/computer probing of networks, which (in the USA) is almost never a Federal crime;

Note: Even though governments (for example the USA's Department of Defense) frequently call #2 and #3 "attacks" they are not "attacks" and are almost never illegal.

4. and then there is hacking, which (in the USA) is a crime... BUT, depending on the circumstances, might not reach the threshold for prosecution.

5. There are many affiliated crimes (again in the USA) like collecting passwords, pin numbers, user IDs, names, etc.... these are often done by bots and are criminal in nature... depending on the exact circumstances, and where the data was obtained.

6. And finally, the physical theft of data that does not use the internet in anyway (like what wikileaks typically does) ... which are not hacking.
Reply to Topic<< Previous Topic | Next Topic >>
Pages: << · 1 2 3 4 · >>

1 browsing (0 members - 1 guest)

Quick Reply
Be Respectful of Others

      
Subscribe to topic prefs

Similar Topics
    Forum Topic Last Post Replies Views
New posts   Politics
Wed Oct 14, 2009 @ 05:44
4 576
New posts   Business & Money
Tue Sep 18, 2012 @ 04:18
32 1933
New posts   Random
Sat Jan 22, 2011 @ 04:22
11 1220
New posts   News & Current Events
Tue Dec 30, 2014 @ 19:44
43 3065
New posts   Rants & Raves
Fri Sep 26, 2008 @ 18:31
10 534