Preview

Chewy 123 Case Study

Good Essays
Open Document
Open Document
371 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chewy 123 Case Study
Think Critically: Chewy 123
Read real-world scenario to help understand and apply the theory.

FBI's most-wanted cybercriminal, Jeremy Hammond is serving one of the longest sentences a US hacker has received 10 years, the maximum allowed under his plea agreement. But to this day, he's unsure how agents cracked his Mac's encryption. Perhaps it was the fact his password was his cat's name and the numbers 123.
A hacktivist for more than a decade, Hammond, 29, was arrested in 2012 after penetrating the US-based security think tank Stratfor, whose clients include the US Department of Homeland Security and the Defense Department.
He'd been working with a subgroup of the loose-knit hacking movement "Anonymous" to disrupt the networks of Sony Pictures,

You May Also Find These Documents Helpful

  • Powerful Essays

    Charette, R. (2008, January 7). FAA To Boeing: Please Show That 787 Dreamliner Can’t Be Hacked.…

    • 1124 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In a similar case Kerry F. Khan was a program manager for the U.S. Army Corps of Engineers that was charged with conspiracy, bribery, unlawful kickbacks, conspiracy to launder monetary instruments and criminal forfeiture. According to the U.S. Attorney Ronald C. Machen (2013), “Kerry Khan was the ringleader of the largest bribery and bid-rigging scheme in the history of federal contracting,” said U.S. Attorney Machen. “His corrupt network of public officials and private contractors looted the U.S. Treasury for years” (para. 8). For the act committed by Khan he was sentenced to 19 years in prison.…

    • 96 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Toshi, thrilled off of hacking through cyberspace, finally met his match when the RIAA hired him to work for their…

    • 605 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Canine Candies Venture has been deemed a success due to the break-even amount being reached and profit being made. As the day was slow to begin with, rain being a prominent factor at the start and the market being postponed for 2 hours, this could have contributed to not all stock being sold and the lack of people buying. This also wasn't helped by the lack of cash people had on them, most could not be bothered getting money out of the cash point which was directly outside.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Introduction: Below I will present an argument that that shows the computer hacking by Max Butler, the main character, demonstrated in the book Kingpin by Kevin Poulsen, was unethical in nature. Max’s actions illustrate computer crime defined as, “any incident involving an intentional act where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain and is associated with computers” (Parker, 1976). Max utilized his hacking skills in a malicious manner to victimize individuals by taking their personal property.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Monsegur Research Papers

    • 303 Words
    • 2 Pages

    The FBI immediately put Hector X. Monsegur to work for three years to bring down the other top hackers in his group. 300 cyber-attacks were stopped and charges were given to six alleged hackers. Some of Monsegur’s crimes consisted of “three counts of conspiracy to engage in computer hacking, computer hacking in furtherance of fraud, conspiracy to commit access device fraud, conspiracy to commit bank fraud and aggravated identity theft” (Chad Bray). Most black hats should be dealt with in this manner; use their talents to catch other hackers first and then decide if he’s worthy of a pardon. He helped bring down a big threat, but that is no reason to set him loose. If the authorities hired more white and gray hats instead of jailing them and used captured black hats as a counter offense they could all prove very beneficial.…

    • 303 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Take Home Midterm

    • 1653 Words
    • 7 Pages

    Another hacker wrongfully accused was named Jonathan James, or c0mrade. He was convicted and sent to prison for hacking in the United States–all while he was still a minor. At only fifteen years of age, he managed to hack into a number of networks, including those belonging to Bell South, Miami-Dade, the U.S. Department of Defense, and NASA.…

    • 1653 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Silk Road

    • 641 Words
    • 3 Pages

    Ross Ulbricht was arrested for creating the drug market “Silk Road”. Eric Marques was arrested for distributing child pornography on the Dark Net. Both of these men learned that the Dark Net is not anonymous. Ross Ulbricht and Eric Marques learned that the FBI has the power to do almost anything and if they want to find a suspect they will. The Dark Net has become more dangerous as the years go on. The Dark Net is used for a variety of illegal activities, including: hiring hitmen, purchasing and selling drugs, and viewing and uploading child pornography.…

    • 641 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    POLICE HISTORY

    • 470 Words
    • 2 Pages

    On August 21, 2013 Army Colonel Denise Lind, a military judge sentenced Pfc. Bradley Manning to 35 years in prison for leaking the largest cache of classified documents in U.S history. Lind also awarded Bradley with a dishonorable discharge, reduction in rank to private and all pay forfeited.…

    • 470 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    “Whoever hacked into our system is bright. They didn’t leave many traces. I don’t think it was a student. This is some pretty sophisticated hacking. The police are getting closer to the hacker, though. He or she left a few bread crumbs for us to follow. Ed Robles (district technology…

    • 732 Words
    • 3 Pages
    Good Essays