Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Psychology of Hackers: Steps Toward a New Taxonomy

Similar presentations


Presentation on theme: "The Psychology of Hackers: Steps Toward a New Taxonomy"— Presentation transcript:

1 The Psychology of Hackers: Steps Toward a New Taxonomy
Marc Rogers Dept. of Psychology University of Manitoba Senior Security Technical Architect EDS Systemhouse Canada UofM SHL Systemhouse

2 Agenda Introduction Evolution of the Term Theories of Deviance
A New Taxonomy Demographics Psychological Profiles Conclusion UofM SHL Systemhouse

3 Introduction Criminal Hackers current “enemy” to IT/IS Security
Research their targets $124 Million lost in 1999 (CSI/FBI) Intelligence gathering Information sharing What do we know about them? UofM

4 Evolution of the Term 4 Generations of the term Hacker
1st Generation: Creative Programmer: MIT/Stanford (1960’s) 2nd Generation: Computer Evolutionaries (1970’s) 3rd Generation: Games & Copyright breaking (1980’s) *4th Generation: Criminals & Cyberpunks (1990’s) UofM SHL Systemhouse

5 1st Generation Creative Programmers & Scientists
Novel methods for programming (code bumming) Hacker Ethic (The Right Thing.) Very respected (Gurus) MIT (TMRC) & Stanford (SAIL) UofM SHL Systemhouse

6 2nd Generation Computer Evolutionary Hardware Hackers
Mainframe to personal systems Computer Kits (Altair, Apple) Founders of Major Computer Companies Minor criminal activity: Phreaking/Blue Boxing Software Piracy UofM SHL Systemhouse

7 3rd Generation Computer Games & Copyrights Game Hackers Personal PC
Computer for entertainment Methods for protecting and breaking copyright codes on games Minor criminal activity UofM SHL Systemhouse

8 4th Generation Criminals Cyber-punks Not respected
Rarely technically elite Motivated primarily by greed, power, revenge, malicious intent Not respected UofM SHL Systemhouse

9 Theories of Deviance Traditional theories of deviance
Why individuals become involved in delinquent behavior? How do they justify the behaviors engaged in? UofM

10 Theories of Deviance Differential Association:
Delinquency based on normative conflict Conflicting definitions of appropriate behavior Differential association - communication with intimate groups (peer pressure) UofM SHL Systemhouse

11 Theories of Deviance Conflicting norms and definitions
Almost a sub-culture Strong hacker peer pressure Reinforcement: Internal/External/Vicarious Complex schedule of Reinforcement UofM SHL Systemhouse

12 Moral Disengagement Social Learning Theory (Bandura) Moral standards
Avoid Self-Censure Rightness of their actions Valued social or moral purposes UofM

13 Moral Disengagement Mechanisms :
Moral justification, Minimizing, ignoring or misconstruing the consequences, Dehumanizing, Attribution of blame on victims. UofM

14 A New Taxonomy Hackers, Phreakers, Crackers (Moot) Generic Term
Research on Generic Criminals? Wide Range of activities What groups? Operational Definition UofM

15 A New Taxonomy Proposed: Novice (newbies\script kiddies) Cyber-punks
Insiders Coders Old Guard Professionals Cyber-Terrorists Political Activists? UofM

16 A New Taxonomy Hacker Continuum UofM

17 Novice (Newbie/Script Kiddies)
Limited computer skills New to the activity Rely on software available on the Internet Nuisance attacks: Denial of Service (DOS) Can cause extensive damage to systems as they don’t understand how the attack works Media attention UofM SHL Systemhouse

18 Cyber-punks Better computer skills Limited programming knowledge
Better understanding of how the attack works Criminal intent, malicious behavior, credit card frauds, etc. Media attention UofM SHL Systemhouse

19 Insiders Computer literate Technology/Information Fields
Disgruntled, Ex-employee Able to carry out attack due to privileges inherent in position Largest security problem: 70-80% of all computer security breaches UofM SHL Systemhouse

20 Coders Technically skilled Writes the scripts and automated tools
Acts as a mentor to the newbies Motivated by a sense of power and prestige Revered Dangerous (hidden agendas, trojans etc) UofM

21 Old Guard No criminal intent Values similar to 1st generation
Disturbing lack of regard for private property Mentoring Very defensive and limited view of hacker community. UofM

22 Professional Criminals Thieves Corporate Espionage Guns for Hire
Highly motivated, highly trained, state of the art equipment Very little known of this group UofM SHL Systemhouse

23 Cyber-Terrorists Increase in activity since the fall of many Eastern Bloc intelligence agencies Well funded Very motivated Mixing political rhetoric with criminal activity Information Warfare: Rand Corp. Day after scenario Very little known in this area UofM

24 Personality Profiles & Demographics
Limited “true” empirical research Self report based Several “documentary” books written (objectivity is questionable) Findings not generalizable to other subgroups Criminal Activities UofM SHL Systemhouse

25 Demographics Current Research: Caucasian Male 12-28 years old
Middle Class Limited Social Skills Perform poorly in school: aptitude for computers & technology Dysfunctional families UofM SHL Systemhouse

26 Personality Profiles Socially Inept Obsessive
Loners yet appear to crave membership Inferiority Complex Escapism Motivation Computer Addictive Disorder? UofM SHL Systemhouse

27 Conclusion New breed of criminals (specific sub-groups)
Non homogeneous classification Little known about the true problem groups Responsible for over $124 Million dollars in (CSI-FBI Study). As the Internet grows so to does the rate of criminal activity (Howard, 1997) Obvious need for a new taxonomy & more research No Generic Hacker Profile UofM

28 The Psychology of Hackers: Steps Toward a New Taxonomy
"..If you know yourself but not the enemy, for every victory gained you will also suffer a defeat". Sun TZU UofM


Download ppt "The Psychology of Hackers: Steps Toward a New Taxonomy"

Similar presentations


Ads by Google