The Psychology of Hackers Steps Toward a New

  • Slides: 28
Download presentation
The Psychology of Hackers: Steps Toward a New Taxonomy Marc Rogers Dept. of Psychology

The Psychology of Hackers: Steps Toward a New Taxonomy Marc Rogers Dept. of Psychology University of Manitoba Senior Security Technical Architect EDS Systemhouse Canada Uof. M 1

Agenda n n n n Introduction Evolution of the Term Theories of Deviance A

Agenda n n n n Introduction Evolution of the Term Theories of Deviance A New Taxonomy Demographics Psychological Profiles Conclusion Uof. M 2

Introduction Criminal Hackers current “enemy” to IT/IS Security n Research their targets n $124

Introduction Criminal Hackers current “enemy” to IT/IS Security n Research their targets n $124 Million lost in 1999 (CSI/FBI) n Intelligence gathering n Information sharing n What do we know about them? n Uof. M 3

Evolution of the Term n 4 Generations of the term Hacker – 1 st

Evolution of the Term n 4 Generations of the term Hacker – 1 st Generation: Creative Programmer: MIT/Stanford (1960’s) – 2 nd Generation: Computer Evolutionaries (1970’s) – 3 rd Generation: Games & Copyright breaking (1980’s) – *4 th Generation: Criminals & Cyberpunks (1990’s) Uof. M 4

1 st Generation Creative Programmers & Scientists n Novel methods for programming (code bumming)

1 st Generation Creative Programmers & Scientists n Novel methods for programming (code bumming) n Hacker Ethic (The Right Thing. ) n Very respected (Gurus) n MIT (TMRC) & Stanford (SAIL) n Uof. M 5

2 nd Generation n Computer Evolutionary n Hardware Hackers – Mainframe to personal systems

2 nd Generation n Computer Evolutionary n Hardware Hackers – Mainframe to personal systems – Computer Kits (Altair, Apple) n Founders of Major Computer Companies – Minor criminal activity: Phreaking/Blue Boxing – Software Piracy Uof. M 6

3 rd Generation n Computer Games & Copyrights – Game Hackers – Personal PC

3 rd Generation n Computer Games & Copyrights – Game Hackers – Personal PC – Computer for entertainment – Methods for protecting and breaking copyright codes on games – Minor criminal activity Uof. M 7

4 th Generation n Criminals n Cyber-punks – Rarely technically elite – Motivated primarily

4 th Generation n Criminals n Cyber-punks – Rarely technically elite – Motivated primarily by greed, power, revenge, malicious intent n Not respected Uof. M 8

Theories of Deviance n Traditional theories of deviance n Why individuals become involved in

Theories of Deviance n Traditional theories of deviance n Why individuals become involved in delinquent behavior? n How do they justify the behaviors engaged in? Uof. M 9

Theories of Deviance Differential Association: Delinquency based on normative conflict n Conflicting definitions of

Theories of Deviance Differential Association: Delinquency based on normative conflict n Conflicting definitions of appropriate behavior n Differential association - communication with intimate groups (peer pressure) n Uof. M 10

Theories of Deviance n Conflicting norms and definitions n Almost a sub-culture n Strong

Theories of Deviance n Conflicting norms and definitions n Almost a sub-culture n Strong hacker peer pressure n Reinforcement: Internal/External/Vicarious n Complex schedule of Reinforcement Uof. M 11

Moral Disengagement Social Learning Theory (Bandura) Moral standards n Avoid Self-Censure n Rightness of

Moral Disengagement Social Learning Theory (Bandura) Moral standards n Avoid Self-Censure n Rightness of their actions n Valued social or moral purposes n Uof. M 12

Moral Disengagement Mechanisms : Moral justification, n Minimizing, ignoring or misconstruing the consequences, n

Moral Disengagement Mechanisms : Moral justification, n Minimizing, ignoring or misconstruing the consequences, n Dehumanizing, n Attribution of blame on victims. n Uof. M 13

A New Taxonomy n Hackers, Phreakers, Crackers (Moot) n Generic Term n Research on

A New Taxonomy n Hackers, Phreakers, Crackers (Moot) n Generic Term n Research on Generic Criminals? n Wide Range of activities n What groups? n Operational Definition Uof. M 14

A New Taxonomy Proposed: n n n n Novice (newbiesscript kiddies) Cyber-punks Insiders Coders

A New Taxonomy Proposed: n n n n Novice (newbiesscript kiddies) Cyber-punks Insiders Coders Old Guard Professionals Cyber-Terrorists Political Activists? Uof. M 15

A New Taxonomy n Hacker Continuum Uof. M 16

A New Taxonomy n Hacker Continuum Uof. M 16

Novice (Newbie/Script Kiddies) Limited computer skills n New to the activity n Rely on

Novice (Newbie/Script Kiddies) Limited computer skills n New to the activity n Rely on software available on the Internet n Nuisance attacks: Denial of Service (DOS) n Can cause extensive damage to systems as they don’t understand how the attack works n Media attention n Uof. M 17

Cyber-punks Better computer skills n Limited programming knowledge n Better understanding of how the

Cyber-punks Better computer skills n Limited programming knowledge n Better understanding of how the attack works n Criminal intent, malicious behavior, credit card frauds, etc. n Media attention n Uof. M 18

Insiders Computer literate n Technology/Information Fields n Disgruntled, Ex-employee n Able to carry out

Insiders Computer literate n Technology/Information Fields n Disgruntled, Ex-employee n Able to carry out attack due to privileges inherent in position n Largest security problem: 70 -80% of all computer security breaches n Uof. M 19

Coders Technically skilled n Writes the scripts and automated tools n Acts as a

Coders Technically skilled n Writes the scripts and automated tools n Acts as a mentor to the newbies n Motivated by a sense of power and prestige n Revered n Dangerous (hidden agendas, trojans etc) n Uof. M 20

Old Guard No criminal intent n Values similar to 1 st generation n Disturbing

Old Guard No criminal intent n Values similar to 1 st generation n Disturbing lack of regard for private property n Mentoring n Very defensive and limited view of hacker community. n Uof. M 21

Professional Criminals n Thieves n Corporate Espionage n Guns for Hire n Highly motivated,

Professional Criminals n Thieves n Corporate Espionage n Guns for Hire n Highly motivated, highly trained, state of the art equipment n Very little known of this group n Uof. M 22

Cyber-Terrorists Increase in activity since the fall of many Eastern Bloc intelligence agencies n

Cyber-Terrorists Increase in activity since the fall of many Eastern Bloc intelligence agencies n Well funded n Very motivated n Mixing political rhetoric with criminal activity n Information Warfare: Rand Corp. Day after scenario n Very little known in this area n Uof. M 23

Personality Profiles & Demographics Limited “true” empirical research n Self report based n Several

Personality Profiles & Demographics Limited “true” empirical research n Self report based n Several “documentary” books written (objectivity is questionable) n Findings not generalizable to other subgroups n Criminal Activities n Uof. M 24

Demographics n Current Research: – Caucasian – Male – 12 -28 years old –

Demographics n Current Research: – Caucasian – Male – 12 -28 years old – Middle Class – Limited Social Skills – Perform poorly in school: aptitude for computers & technology – Dysfunctional families Uof. M 25

Personality Profiles Socially Inept n Obsessive n Loners yet appear to crave membership n

Personality Profiles Socially Inept n Obsessive n Loners yet appear to crave membership n Inferiority Complex n Escapism n Motivation n Computer Addictive Disorder? n Uof. M 26

Conclusion n n n New breed of criminals (specific sub-groups) Non homogeneous classification Little

Conclusion n n n New breed of criminals (specific sub-groups) Non homogeneous classification Little known about the true problem groups Responsible for over $124 Million dollars in 1998 -99 (CSI-FBI Study). As the Internet grows so to does the rate of criminal activity (Howard, 1997) Obvious need for a new taxonomy & more research No Generic Hacker Profile Uof. M 27

The Psychology of Hackers: Steps Toward a New Taxonomy ". . If you know

The Psychology of Hackers: Steps Toward a New Taxonomy ". . If you know yourself but not the enemy, for every victory gained you will also suffer a defeat". Sun TZU Uof. M 28