Cover image for Profiling hackers : the science of criminal profiling as applied to the world of hacking
Title:
Profiling hackers : the science of criminal profiling as applied to the world of hacking
Personal Author:
Publication Information:
Boca Raton : Auerbach Publications, 2009
Physical Description:
xxiii, 262 p. ; 24 cm.
ISBN:
9781420086935

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010233998 HV6773 C477 2009 Open Access Book Book
Searching...

On Order

Summary

Summary

Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hackingoffers insight into the hacking realm by telling attention-grabbing tales about bizarre characters that practice hacking as an art.

Focusing on the relationship between technology and crime and drawn from the research conducted by the Hackers Profiling Project (HPP), this volume applies the behavioral science of criminal profiling to the world of internet predators. The authors reveal hidden aspects of the cyber-crime underground, answering questions such as: Who is a real hacker? What life does a hacker lead when not on-line? Is it possible to determine a hacker's profile on the basis of his behavior or types of intrusion? What is the motive behind phishing, pharming, viruses, and worms?

After gaining notoriety for breaking into many high-profile computer systems, the Italian hacker Raoul Chiesa turned to ethical hacking in 1995. Today he uses his skills and abilities to find ways to protect networks and computer systems. Stefania Ducci is a member of the Counter Human Trafficking and Emerging Crimes Unit at the United Nations Interregional Crime and Justice Research Institute (UNICRI). Silvio Ciappi is a criminologist who lectures at the University of Pisa and studies criminal profiling. These three experts with vastly different backgrounds explore the clandestine network of cyber-criminals, providing an unparalleled glimpse into the secret lives of these malevolent individuals.


Table of Contents

Acknowledgmentsp. xi
Forewordp. xv
Foreword to the Italian Editionp. xvii
Book Presentationp. xix
Introductionp. xxi
Chapter 1 Introduction to Criminal Profilingp. 1
Brief History of Criminal Profilingp. 1
London, 1888p. 1
Quantico, Virginia, 1970p. 1
Liverpool, 1993p. 3
California, 1997p. 5
Serial Crimes and Criminal Profiling: How to Interpret Themp. 6
The Crime Scene Reflects the Personality of the Perpetratorp. 7
The Crime Method Tends to Remain the Same over Timep. 7
Criminal Profiling: Applying It to Study Hackersp. 9
Chapter 2 Introducing "Cybercrime"p. 13
Information Technology and Digital Crimesp. 15
1980, 1990, 2000: Three Ways of Looking at Cybercrimep. 17
Mr. Smith, Hackers, and Digital Crimes in the IT Societyp. 17
Digital Crimes vs. Hacking: Terminology and Definitionsp. 20
Password Guessingp. 21
Self-Replicating Codep. 22
Password Crackingp. 23
Exploiting Known Vulnerabilityp. 25
Disabling Auditp. 25
Backdoorp. 26
Hijacking Sessionp. 27
Snifferp. 27
Stealth Diagnosticp. 28
Packet Spoofingp. 28
GUIp. 29
Automated Probe/Scanp. 30
WWW Attack/Incidentp. 31
Denial of Service (DoS)p. 31
Conclusionsp. 32
Chapter 3 To Be, Think, and Live as a Hackerp. 33
Evolution of the Termp. 35
The Artifacts of the Hacker Culturep. 35
The Jargon Filep. 37
The Hacker Manifestop. 38
One Code of Ethics or More?p. 39
Understanding Hackers: How Far Have We Gone?p. 40
What Are the Motives behind Hacking?p. 44
The Colors of the Undergroundp. 46
Commonly Recognized Hacker Categoriesp. 52
Wannabe Lamerp. 53
Script Kiddiep. 53
"37337 K-rAd iRC #hack 0-day Exploitz" Guyp. 54
Crackerp. 54
Ethical Hackerp. 55
Quiet, Paranoid, Skilled Hackerp. 55
Cyber-Warriorp. 56
Industrial Spyp. 56
Government Agentp. 56
Chapter 4 The HPP Projectp. 57
The Planning Phasep. 59
Phase 1 Theoretical Data Collectionp. 60
Phase 2 Observationp. 62
Phase 3 Archivingp. 63
Phase 4 "Live" Data Collectionp. 64
Phase 5 G&C Analysisp. 65
Phase 6 HPP Live Assessment (24/7)p. 65
Phase 7 Final Profilingp. 66
Phase 8 Dissemination of the Modelp. 66
The Questionnairesp. 66
The Formatp. 68
Distributionp. 70
First-Level Analysisp. 72
Provenance of the Questionnairesp. 72
Basic Statisticsp. 73
Second-Level Analysisp. 76
Time Spent Hackingp. 78
Legal Aspectsp. 80
Personalityp. 82
Relationships with the Outside Worldp. 84
Chapter 5 Who Are Hackers? Part 1p. 87
What Are We Trying to Understand?p. 87
Gender and Age Groupp. 90
Background and Place of Residencep. 91
How Hackers View Themselvesp. 91
Family Backgroundp. 93
Socioeconomic Backgroundp. 95
Social Relationshipsp. 95
Leisure Activitiesp. 97
Educationp. 98
Professional Environmentp. 100
Psychological Traitsp. 102
To Be or to Appear: The Level of Self-Esteemp. 105
Presence of Multiple Personalitiesp. 106
Psychophysical Conditionsp. 108
Alcohol, Drug Abuse and Dependenciesp. 109
Definition or Self-Definition: What Is a Real Hacker?p. 111
Relationship Datap. 113
Relationship with Parentsp. 113
Relationship with the Authoritiesp. 114
Relationships with Friends, Schoolmates, Colleagues at Workp. 115
Relationships with Other Members of the Underground Communityp. 116
Chapter 6 Who Are Hackers? Part 2p. 121
Handle and Nicknamep. 121
Starting Agep. 122
Learning and Training Modalitiesp. 122
The Mentor's Rolep. 125
Technical Capacities (Know-How)p. 126
Hacking, Phreaking, or Carding: The Reasons behind the Choicep. 127
Networks, Technologies, and Operating Systemsp. 130
Techniques Used to Penetrate a Systemp. 131
Social Engineeringp. 133
Password Searchp. 134
Individual and Group Attacksp. 135
The Art of War: Examples of Attack Techniquesp. 136
Attack Proceduresp. 138
War Dialingp. 138
Ping-of-Death Attack against Web Serversp. 138
NMAPp. 138
Denial-of-Service (DoS)p. 139
Distributed Denial-of-Service (DDoS) Attackp. 140
Operating inside a Target Systemp. 141
The Hacker's Signaturep. 142
Relationships with System Administratorsp. 143
Motivationsp. 144
The First Stepp. 144
Declared Motivesp. 145
Intellectual Curiosityp. 147
Love of Technologyp. 150
Fun and Gamesp. 150
Making the PC World Saferp. 151
Fighting for Freedomp. 152
Conflict with Authorityp. 153
Rebelliousnessp. 154
Spirit of Adventure and Ownershipp. 155
Boredomp. 156
Attracting Attention, Becoming Famousp. 156
Anger and Frustrationp. 156
Political Reasonsp. 158
Escape from Family, Escape from Societyp. 158
Professionalsp. 158
The Power Tripp. 159
Lone Hackersp. 161
Hacker Groupsp. 162
Initiation Ritesp. 163
Internal Organization of Groupsp. 164
Rules and Social Intercourse within the Groupp. 165
Favorite Targets and Reasonsp. 166
Specializationsp. 168
Web Defacingp. 169
Software Crackingp. 170
Principles of the Hacker Ethicsp. 171
Acceptance or Refusal of the Hacker Ethicsp. 174
Crashed Systemsp. 176
Hacking/Phreaking Addictionp. 177
Perception of the Illegality of Their Actionsp. 179
Offenses Perpetrated with the Aid of IT Devicesp. 182
Offenses Perpetrated without the Use of IT Devicesp. 183
Fear of Discovery, Arrest, and Convictionp. 183
The Law as Deterrentp. 184
Effect of Convictionsp. 185
Leaving the Hacker Scenep. 186
Beyond Hackingp. 187
Chapter 7 Conclusionsp. 189
Afterword: Slaying Today's Dragons: Hackers in Cyberspacep. 193
Appendix A HPP Questionnairep. 199
Appendix B Hacker Biosp. 221
Appendix C The Nine Hacker Categoriesp. 239
Appendix D The Hacker Manifesto (Conscience of a Hacker)p. 243
Bibliography and Online Referencesp. 245
Indexp. 251