Anda di halaman 1dari 21

Filmpje e-vaardigheden: Hacking

Het onderwerp dat ik gekozen heb is hacking.

Hacking leek me interessant om een filmpje over te maken omdat het vaak door de media en door
films verkeerd wordt voorgesteld.
Er zijn evengoed mensen die er een legale carrire mee opbouwen.
Dat terzijde vind ik ook de sociale impact boeiend.
Wat ik daarmee bedoel is dat men steeds vaker en vaker hacking gaat gebruiken in onze Westerse
wereld als weerwraak op onaanvaardbare beslissingen van overheden i.p.v. te demonstreren of
rellen uit te lokken. Zo had je bevoorbeeld het WikiLeaks schandaal, waarbij meerdere
hackerscollectieven overheidwebsites platlegden omdat ze WikiLeaks blokkeerden/aanvielen.
In mijn filmpje focus ik me vooral op de verschillende soorten hackers en de ethische problemen van
het hacken.

Anonymous Hacker Who Exposed the
Steubenville Rapists May Get More
Prison Time Than Rapists

Deric Lostutter, the 26-year-old hacktivist who leaked the
evidence that led to the conviction of two of the Steubenville,
Ohio rapists is now facing more time behind bars than the rapists
he exposed. The Steubenville Rape Case made national headlines
when a video made by the rapists themselves, and their friends,
proved that their victim was unconscious and unable to consent.
Instead of giving Lostutter thanks for exposing these criminals,
however, the FBI raided his house last April. At first, Lostutter had
denied that he was the man in the video, but he decided to come
forward after the appalling reaction of the rapists after they were
Lostutter is now facing ten years behind bars if indicted for obtaining tweets and social media posts
which revealed the details of the rape as well as for threatening action against the Steubenville
rapists and school officials who helped to cover up the crime. Lostutter posted the video to the
Steubenville High School football team website, bringing national attention to the case and the
Word of Lostutters 10-years comes just as one of the rapists themselves, MaLik Richomond, 16, was
just released from prison for good behavior.
The Richomond family released a statement, following the release, which focused on how hard the
past 16 months have been for MaLik. The attorney for MaLiks rape victim noted there was no
apology made to her in that statement.
Although everyone hopes convicted criminals are rehabilitated, it is disheartening that this
convicted rapists press release does not make a single reference to the victim and her family
whom he and his co-defendant scarred for life. One would expect to see the defendant publicly
apologize for all the pain he caused rather than make statements about himself. Rape is about
victims, not defendants. Obviously, the people writing his press release have yet to learn this
important lesson, attorney Robert Fitzsimmons said.

Inside the Anonymous Hacking File on
the Steubenville 'Rape Crew'
Things already sounded fishy in Steubenville, Ohio, where the alleged gang rape and
kidnapping of an unconscious 16-year-old by two of the town's high-school football players
has turned into a complex web of accusation, shock, and, well, Instagram photos. But
conflicting reports over an already emotional case became that much more complex today
when a WikiLeaks-style site dumped new information about team boosters, the town sheriff,
and the alleged "Rape Crew" online information rounded up, of course, by the anonymous
hacking collective known as Anonymous.
In case you haven't been following the scandal, it rose to national prominence last month
when The New York Times ran a lengthy report from Steubenville, on the August incident and
its intersection of football, the law, and social media. Perhaps one quote, from one
of Steubenville High's 19 football coaches, best summed up the controversy: "The rape was
just an excuse, I think ...What else are you going to tell your parents when you come home
drunk like that and after a night like that? She had to make up something. Now people are
trying to blow up our football program because of it."
The idea that a rape victim made up her story is still floating around, despite photos of the girl
being carried around while allegedly unconscious by her alleged attackers (right). "The citys
police chief begged for witnesses to come forward, but received little response," reported The
New York Times's Juliet Macur and Nate Schweber. Therein comes the cover-up angle that
would attract the attention of the folks behind Anonymous this is a massive football town,
after all. The photo in question was on Instagram, so there were definitely witnesses.
And according to the Times there was a video of the alleged incident which has since been
Afterward, they headed to the home of one football player who has now become a witness for
the prosecution. That player told the police that he was in the back seat of his Volkswagen
Jetta with Mays and the girl when Mays proceeded to flash the girls breasts and penetrate her
with his fingers, while the player videotaped it on his phone. The player, who shared the video
with at least one person, testified that he videotaped Mays and the girl because he was being
stupid, not making the right choices. He said he later deleted the recording.
"Other students (including football players) who watched the alleged assaults and later
tweeted rape jokes were disciplined only months afterward," reported Deadspin's Sam Eifling.
Further information, too, has been hard to come by until today. A site called Local
Leaks has rounded up leaks, anonymous tips through Anonymous, and previously undisclosed
documents, all for the purpose of what it says is a project "giving a voice to the victim of this
horrible crime, and began unraveling this conspiracy of silence designed to protect a group of
these high school football players." Here's what you'll find inside and surrounding what the
two groups are calling The Steubenville Files:
Jim Parks, who runs this "Roll Red Roll" fansite for the football team, "revealed that
he had an exceptionally close relationship with many of the players on the football
team, including those members of 'The Rape Crew.'" Anonymous has hacked his
email, which apparently contains some provocative pictures of young women. Local
Leaks says: "Tips received from anonymous high school students in Steubenville have
indicated it is possible James Parks was receiving images from 'The Rape Crew' of
their 'various conquests.'"

Parks has defended himself:
As you are probably aware, this web site was recently hacked into illegally numerous times
by a terrorist group. The outrageous claims they made while controlling this site were totally
false, completely absurd, and totally unfounded. They were clearly both libelous and
slanderous, and were not even intended to reveal truth, but rather simply to get media
attention and terrorize the Steubenville community. Innocent people have been greatly
Unfortunately, several national media outlets, including the New York Times, have recklessly
decided to aid and abet these acts of illegality and give the terrorists exactly what they
wanted by disseminating inaccurate and legally actionable information and accusations.
Incredibly, they have done so without even bothering to contact this web site for comment.
We wish to make it clear that we will pursue legal justice against the perpetrators of these
evil acts and all of those in the media who chose to help them.
(No, we're not sure how The New York Times decided to "recklessly decided to aid and abet
these acts of illegality" by reporting on the town, but there you have it.)
The hackers think the "Rape Crew" consists of more than two people. As LocalLeaks
notes, Trent Mays and Malik Richmond, the two boys charged with the rape, have
been released on bail and had their cases moved to the juvenile system. LocalLeaks
posted the names of two more students the boy who tweeted out the picture of the
girl being dragged around, and the boy whose house was where the rape allegedly
occurred. The leak suggests that the boy who hosted the party in question was not
punished because his mother is the prosecuting attorney for Jefferson County, where
Steubenville is located.
The Sheriff for Jefferson County is allegedly a friend of the football team.
"LocalLeaks has confirmed that Sheriff Abdalla and Head Football Coach Reno A.
Saccoccia have breakfast a couple of times a week together at the Spot Bar in
Steubenville," reads the leak.
Head Football Coach Reno Saccoccia reportedly has links to the juvenile court system.
"Reno Saccoccias sister in law, Marguierete Clark is the secretary for the juvenile
court Judge Kerr. Coach Saccoccia is actually employed as a mediator in juvenile
court system!" reads the leak.
Saccoccia has already been scrutinized for not taking disciplanary action when the
photos surfaced. From The New York Times report:
Saccoccia, told the principal and school superintendent that the players who posted online
photographs and comments about the girl the night of the parties said they did not think they
had done anything wrong. Because of that, he said, he had no basis for benching those
Approached in November to be interviewed about the case, Saccoccia said he did not "do the
Internet," so he had not seen the comments and photographs posted online from that night.
When asked again about the players involved and why he chose not to discipline them, he
became agitated.
"You made me mad now," he said, throwing in several expletives as he walked from the high
school to his car.
Nearly nose to nose with a reporter, he growled: "You're going to get yours. And if you don't
get yours, somebody close to you will."
The documents and tips funnelled through Anonymous are just that anonymous and so
it's impossible to verify much if any of the new allegations. Local Leaks does claim that "all
the LocalLeaks volunteers began working around the clock to organize, analyse, fact-check,
verify and prepare this disclosure for release." They add:
Finally, we KNOW from the evidence that there are not only more attackers in this Rape
Crew out there that need to be apprehended and brought to justice, but we are absolutely
certain there are more victims as well. If you have been victimized by these young men, we
BEG of you to PLEASE come forward. Tell your parents, confide in a counselor anything. If
you trust no one else, then contact us we will keep you safe and work with you to help you
receive the justice you deserve.
Update: Anonymous was able to recover a video which a former Steubenville student,
described in the video as Michael Nodianos, made several comments and joked about the
alleged victim on the night of the alleged rape. Referring to her as "dead girl," he says in the
video: "They raped her more than the Duke lacrosse team" along with some other "jokes"
about her unconsciousness which he seems to find funny.

Phone hacking: families of war dead
'targeted' by News of the World
The bereaved relatives of soldiers killed in Iraq and Afghanistan may have had their phones hacked
by a private investigator working for the News of the World.
The Daily Telegraph has learnt that the personal details of the families of servicemen who died on
the front line have been found in the files of Glenn Mulcaire, the private detective working for the
Sunday tabloid.
The disclosure that grieving relatives of war dead were targets for the newspaper prompted anger
among military charities, who said it was a disgusting and indefensible assault on privacy.
The Metropolitan Police is facing growing calls from the families of murder victims, those killed in
terrorist attacks and those who died in natural disasters, such as the Indonesian tsunami, to disclose
if they were targets.
Rebekah Brooks, the former editor of the News of the World and now chief executive of News
International, its parent company, faced calls from Ed Miliband, the Labour leader, to step down.
Yesterday The Daily Telegraph disclosed that families of victims of the July 7 bombings were targets
for Mulcaire in the days after the atrocity in 2005.
Last night it emerged that among the 7/7 victims who may have had their phones hacked was Paul
Dadge, who appeared in one of the most memorable images of the London bombings as he helped
Davinia Turrell with a bandaged face at Edgware Road Tube station.
Mr Dadge said he thought his phone may have been hacked because Mrs Turrell would not speak to
journalists. The girl in the photo, Davinia Turrell, because she wasnt talking to the press, they tried
to get at her through me, he said.
He is one of six relations and victims of the attacks who allegedly had their phones hacked. Graham
Foulkes, whose son David was killed in the Edgware Road bomb and Sean Cassidy, whose 22-year-old
son Ciaran was killed in the Kings Cross blast, have also been contacted by Scotland Yard. Yesterday
other victims said to have been hacked by the newspaper were named by MPs in Parliament.
Chris Bryant, a Labour front bencher, named Danielle Jones, a 15-year-old murdered by her uncle in
June 2001, as a potential victim. He also suggested that the phones of individuals linked to the cases
of Madeleine McCann, Sarah Payne, and Scotland Yard detectives who worked on the first
investigation into phone hacking had been targeted.
Last night soldiers charities demanded that the police release the names contained in Mulcaires
9,200 pages of records so they can discover whether they were targets.
Col Douglas Young, the chairman of the British Armed Forces Federation, said police were failing
families by leaving them in the dark about whether or not they had been targets.
He said he would seek a meeting with the Metropolitan Police Commissioner if families were not told
within days whether or not they may have been hacked.
It is now imperative that the police do follow up and do say as quickly as possible 'we have now
contacted everybody involved because otherwise it is going to leave a lot of worry and concern, he
A spokesman for the Army Families Federation added: Families who have endured the loss of their
soldier will find this privacy assault disgusting and indefensible, as will all serving personnel who will
question the sanctity of their precious phone calls home.
The disclosure that the News of the World phone hacking involved victims of crime began earlier this
week with the revelation that Milly Dowlers mobile phone voicemails had been intercepted in the
days following her disappearance.
Police also confirmed that the families of 10-year-olds Holly Wells and Jessica Chapman, who were
murdered by Ian Huntley in Soham in 2002, had been contacted by detectives in Operation Weeting,
the Mets investigation into phone hacking.
Mr Dadge received an email from the Metropolitan Police informing him that his name had appeared
in their records. He said: Im disappointed on a personal level to be honest. I have always co-
operated with the media in anything they wanted and now to find they might have violated my
personal life, its not nice.
Linda Jones, the mother of Danielle, said: The police have promised to investigate on our behalf and
were waiting to hear back.
If we have been targeted then obviously we think we deserve to be told exactly why it was allowed
to happen, when it happened and who was responsible.
This has come out of the blue for us and caused me so much stress. There has to be transparency
and there needs to be answers.
A spokesman for the family of Jean Charles de Menezes, the Brazilian man mistakenly shot dead by
police after the July 7 bombings, last night confirmed they have asked detectives whether there was
any evidence they had been targets. Fiona MacKeown, the mother of 15-year-old Scarlett Keeling,
who was raped and murdered in India in 2008, said she had called Scotland Yard to ask if there was
any evidence her phone had been hacked.
Its ridiculous that people have to go to the cops and ask them for information. If you have been a
victim of a crime then you have the right to know, they should just tell you, she said.
Last night it also emerged that Sion Jenkins, the foster father of murdered Billie-Jo Jenkins, had
contacted police believing his phone had been hacked and had been given only a vague answer. Mr
Jenkinss wife, Tina, said: Its ridiculous because all the people who have had it confirmed that their
voicemails have been broken into have all had money or expensive lawyers. We just want to know
the truth.
Families of the 153 Britons killed in the 2004 Indian Ocean tsunami are also considering contacting
police to find out whether they were targets.
Relations discussed their concerns about the News of the World when they met in London yesterday
for the dedication of a memorial to the victims. If they have broken the law to get details of victims
of the July 7 bombings it is obviously a very small step to do the same for the victims of the tsunami,
said Steve Gill, co-chairman of Tsunami Support UK.
He said that the organisation was considering contacting Scotland Yard collectively to find out
whether victims had been targets.
The latest revelations came as Mrs Brooks, who was editor of the News of the World at the time,
faced growing pressure to step down. She also edited The Sun, another News International title,
which championed Help for Heroes, the military charity, and started a military awards ceremony
known as the Millies.
Colin Myler, the current editor of the News of the World, yesterday told journalists that the paper
faced an extremely painful period ahead.

Classifications of hackers (Wikipedia)
Several subgroups of the computer underground with different attitudes use different terms to
demarcate themselves from each other, or try to exclude some specific group with which they
do not agree.
Eric S. Raymond, author of The New Hacker's Dictionary, advocates that members of the
computer underground should be called crackers. Yet, those people see themselves as hackers
and even try to include the views of Raymond in what they see as a wider hacker culture, a
view that Raymond has harshly rejected. Instead of a hacker/cracker dichotomy, they
emphasize a spectrum of different categories, such as white hat, grey hat, black hat and script
kiddie. In contrast to Raymond, they usually reserve the term cracker for more malicious
Hackers As A Public Service
Recently, hackers have also been viewed in society as providing a public service. The
presence of hackers in todays day and age may actually be benefitting society by providing
the world with the means to verify truths that were previously considered conventional.
Certainly, there are hackers who attempt to create, and other hackers who attempt to destroy.
However, hackers now argue that one can use the techniques of a dark-side hacker, but still
attempt to only achieve good ends.

White hat
Main article: White hat
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own
security system or while working for a security company which makes security software. The
term "white hat" in Internet slang refers to an ethical hacker. This classification also includes
individuals who perform penetration tests and vulnerability assessments within a contractual
agreement. The EC-Council,
also known as the International Council of Electronic
Commerce Consultants, is one of those organizations that have developed certifications,
courseware, classes, and online training covering the diverse arena of Ethical Hacking.

Black hat
A "black hat" hacker is a hacker who "violates computer security for little reason beyond
maliciousness or for personal gain" (Moore, 2005).
Black hat hackers form the
stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome
of all that the public fears in a computer criminal".
Black hat hackers break into secure
networks to destroy data or make the network unusable for those who are authorized to use
the network. Black hat hackers also are referred to as the "crackers" within the security
industry and by modern programmers. Crackers keep the awareness of the vulnerabilities to
themselves and do not notify the general public or manufacturer for patches to be applied.
Individual freedom and accessibility is promoted over privacy and security. Once they have
gained control over a system, they may apply patches or fixes to the system only to keep their
reigning control. Richard Stallman invented the definition to express the maliciousness of a
criminal hacker versus a white hat hacker who performs hacking duties to identify places to

Grey hat
A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker
may surf the internet and hack into a computer system for the sole purpose of notifying the
administrator that their system has a security defect, for example. They may then offer to
correct the defect for a fee.

Elite hacker
A social status among hackers, elite is used to describe the most skilled. Newly discovered
exploits circulate among these hackers. Elite groups such as Masters of Deception conferred a
kind of credibility on their members.

Script kiddie
A script kiddie (also known as a skid or skiddie) is a non-expert who breaks into computer
systems by using pre-packaged automated tools written by others, usually with little
understanding of the underlying concepthence the term script (i.e. a prearranged plan or set
of activities) kiddie (i.e. kid, childan individual lacking knowledge and experience,

A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has
almost no knowledge or experience of the workings of technology and hacking.

Blue hat
A blue hat hacker is someone outside computer security consulting firms who is used to bug-
test a system prior to its launch, looking for exploits so they can be closed. Microsoft also
uses the term BlueHat to represent a series of security briefing events.

A hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or
political message. Most hacktivism involves website defacement or denial-of-service attacks.
Nation state
Intelligence agencies and cyberwarfare operatives of nation states.

Organized criminal gangs
Groups of hackers that carry out organized criminal activities for profit.

From Wikipedia, the free encyclopedia
Hacktivism (a portmanteau of hack and activism) is the use of computers and computer
networks to promote political ends, chiefly free speech, human rights, and information
It is carried out under the premise that proper use of technology can produce results
similar to those of conventional acts of protest, activism, and civil disobedience.
The term has been used at least since November 1995,
though previous accounts have
incorrectly claimed that the term was coined in 1996 by a Cult of the Dead Cow member
known as "Omega".
However, similar to its root word hack, hacktivism is an ambiguous
term (computer hacking is tied to several meanings).
The terms hacktivism and hacktivist are the subject of lexical warfare to define them. Some
definitions of these terms include acts of cyberterrorism while others stop with the use of
technology hacking to effect social change.

1 Overview
2 Controversy
3 Forms of hacktivism
Hacktivist activities span many political ideals and issues. Freenet is a prime example of
translating political thought (anyone should be able to speak) into code.
Hacktivism is a controversial term with several meanings. The sense discussed in this article is
closest to cyber terrorism. The word was coined to characterize electronic direct action as
working toward social change by combining programming skills with critical thinking. But
just as hack can sometimes mean cyber-crime, hacktivism can be used to mean activism that is
malicious, destructive, and undermining the security of the Internet as a technical, economic,
and political platform.

Depending on who is using the term, hacktivism can be a politically motivated technology
hack, a constructive form of anarchic civil disobedience, or an undefined anti-systemic
gesture. It can signal anticapitalist or political protest; it can denote anti-spam activists,
security experts, or open source advocates.
Some people describing themselves as hacktivists have taken to defacing websites for
political reasons, such as attacking and defacing government websites as well as web sites of
groups who oppose their ideology. Others, such as Oxblood Ruffin (the "foreign affairs
minister" of Cult of the Dead Cow and Hacktivismo), have argued forcefully against
definitions of hacktivism that include web defacements or denial-of-service attacks.
the hacking community, those who carry out automated attacks are generally known as script
While some self-described hacktivists have engaged in DoS attacks, critics suggest that DoS
attacks are an attack on free speech that they have unintended consequences. Dos attacks
waste resources and they can lead to a "DoS war" that nobody will win. In 2006, Blue
Security attempted to automate a DoS attack against spammers; this led to a massive DoS
attack against Blue Security which knocked them, their old ISP and their DNS provider off
the internet, destroying their business.

Following denial-of-service attacks by Anonymous on multiple sites, in reprisal for the
apparent suppression of Wikileaks, John Perry Barlow, a founding member of the EFF, said "I
support freedom of expression, no matter whose, so I oppose DDoS attacks regardless of their
target... they're the poison gas of cyberspace...".
On the other hand, Jay Leiderman, an
attorney for many hacktivists, argues that DDoS can be a legitimate form of protest speech in
situations that are reasonably limited in time, place and manner.

Forms of hacktivism
In order to carry out their operations, hacktivists might create new tools; or integrate or use a
variety of software tools readily available on the Internet. One class of hacktivist activities
includes increasing the accessibility of others to take politically motivated action online.
1. Code: Software and websites can achieve political purposes. For example, the encryption
software PGP can be used to secure communications; PGP's author, Phil Zimmermann said
he distributed it first to the peace movement.
Jim Warren suggests PGP's wide
dissemination was in response to Senate Bill 266, authored by Senators Biden and DeConcini,
which demanded that "...communications systems permit the government to obtain the
plain text contents of voice, data, and other communications...".
WikiLeaks is an example
of a politically motivated website: it seeks to "keep governments open".

2. Website Mirroring: is used as a circumvention tool to bypass censorship blocks on websites.
It is a technique that copies the content of a censored website and posts it to other domains
and subdomains that are not censored.

3. Geo-bombing: a technique in which netizens add a geo-tag while editing YouTube videos so
that the location of the video can be displayed in Google Earth.
4. Anonymous blogging: a method of speaking out to a wide audience about human rights
issues, government oppression, etc. that utilizes various web tools such as free email
accounts, IP masking, and blogging software to preserve a high level of anonymity.

RECAP is software that was written to 'liberate US case law' and make it freely available
online. The software project takes the form of distributed document collection and

Duitse hacker kraakt site Amerikaanse
geheime dienst NSA

BERLIJN - De Duitse hacker Matthias Ungethm heeft de Amerikaanse geheime dienst NSA
behoorlijk te kijk gezet. Hij hackte de website van de dienst, die flink onder vuur ligt vanwege
het afluisteren van bevriende buitenlandse politici, zoals bondskanselier Angela Merkel.
Tegen DPA zei Ungethm dat hij niet had verwacht gaten in de beveiliging van de site te
kunnen vinden. "Ik was er een nacht mee bezig", zegt de 24-jarige Duitser. Eenmaal binnen
veranderde hij de slogan op de site. Van Codebreakers and Codemakers maakte hij
Durchleuchten Sie Ihre Homepage. Dat betekent zoiets als lichten jullie eens je website
Nadat de Duitse zender MDR over de hack had bericht, heeft de NSA het gat gedicht, maar
daarmee is de kous nog niet af. Ungethm ontdekte ook dat het een koud kunstje was om bij
een databank van de geheime dienst te komen.
"Ik kon informatie krijgen die helemaal niet voor de buitenwereld is bestemd", zegt hij.
Ungethm zegt dat hij niets uit de databanken heeft gehaald. "Maar zulke sites zijn natuurlijk
heel aantrekkelijk voor kwaadwillenden."
De Duitser heeft de NSA via een mailtje van zijn bevindingen op de hoogte gesteld. Hij heeft
er nog geen antwoord op gekregen. Bang dat de NSA hem op de korrel meent, is hij niet.
"Daar maak ik me echt geen zorgen over."

iOS-hacker i0n1c toont gejailbreakte
iPhone 5c met iOS 7.1.1
Melvin Wijkstra - mei 19, 2014 om 12:03
iPhone iPad
Stefan Esser, beter bekend als i0n1c, heeft via Twitter bevestigd dat hij in het bezit is van een
iOS 7.1.1 jailbreak. De hacker plaatste een foto van zijn iPhone 5c waar Cydia op draait.
Eerder slaagde hacker iH8sn0w er al in om iOS 7.1 te jailbreaken op een iPhone 4s.
Het is nog onduidelijk of Stefan Esser plannen heeft om zijn jailbreak vrij te geven.
Vermoedelijk wacht de hacker op iOS 8 om te kijken of het lek daarin ook aanwezig is. De
laatste jailbreak die voor iOS verscheen was evasi0n. Deze jailbreak is ontwikkeld door
evad3rs en ondersteunt iOS 7.0 tot en met iOS 7.0.6.

Hacker Is Selling Your Personal Data
Online Cheap!
By Martha C. White Dec. 21, 20111 Comment
Did you know theres a virtual online marketplace where hackers gather to buy and sell the
fruits of their criminal labors? Think of Amazon or eBay except the items customers put
into their virtual shopping carts are stolen credit card numbers rather than audiobooks or dusty
collectibles. If this sounds infuriating, just wait until you find out how much one crook
charges another for a victims name, address, card number with expiration date and even the
three-digit CVV code on the back: Its less than youd pay for a blended drink at a fancy
coffee shop. Bloomberg reports that an Eastern European hacker who goes by the handle
Poxxie broke into the computer system of a U.S. company and helped himself to 1,400
accounts, which he then turned around and sold on an e-commerce site for cybercriminals for
a mere $3.50 a pop.
The only thing that might be more annoying than going through the aggravation and anxiety
of having some thief steal your credit card is knowing he or she probably paid only a few
bucks for the privilege and got to shop for your personal information via an online
underworld that makes it absurdly easy to point, click and buy stolen account information.
Bloomberg says websites that traffic in stolen card numbers mirror legitimate online
marketplaces they have virtual shopping carts and seller ratings. Some have customer
service operations, and the article even mentions one that has a call center designed to help
far-flung criminals contend with language barriers if their victims are halfway around the
Cybercrooks make off with $114 billion in data each year, but getting into the illegitimate biz
takes a surprisingly small investment: Damaging malware can be purchased for as little as
$2,000, and it costs only pennies to spam each potential victim, the article says. While
authorities are aware of these operations, law enforcement takes on a kind of cat-and-mouse
quality. Most online cybercrime swap meets are run from overseas, out of the reach of U.S.
law. Many also frequently change servers to avoid detection.
To prevent having your personal information sold off for pocket change in this freewheeling
underground bazaar, take steps to prevent crooks from worming their way into your computer
in the first place. Keep anti-virus software updated and be suspicious of emails or unusual
correspondence that claim to be from your credit card company. Go through your statements
to make sure there arent any charges you dont remember making; credit card thieves will
often make a tiny purchase to verify if the account is still live before taking your card on a
big-ticket shopping spree
Russian hackers rob US banks
But at least they don't shoot people
By Nick Farrell
Thu Dec 24 2009, 10:08
IN THE SEASON of good will, the FBI has been saying that some Russian hackers have
been robbing US banks.
Apparently the hackers, formerly known as the Russian Business Network, are almost certain
to make Santa's naughty list this year and not going to get any presents at all.
These Russian criminals have been quiet for a couple of years, masterminding a string of
crimes including identity theft, fraud, spam and child porn.
But according to the Wall Street Journal, Citigroup was targeted by the Russian hacker outfit
and had millions of dollars nicked.
Citigroup has denied that the FBI is investigating any incident at the bank. It swears on
Rudolph the red nosed reindeer's bright and shiny glowing nose that it hasn't fallen prey to
any hackers.
However Citigroup has admitted that one customer's account was drained of more than $1
million after being hacked.
Apparently the Russian group has moved its servers from St Petersburg to China, which is a
pity because they will be missing out on a very white Christmas this year.

Fraud Ring In Hacking Attack On 60 Banks
Some 60m euro is stolen from bank accounts in a massive cyber raid, after
fraudsters raid dozens of banks around the world.
8:16am UK, Wednesday 27 June 2012

By Pete Norman, Sky News Online
Sixty million euro has been stolen from bank accounts in a massive cyber bank raid after
fraudsters raided dozens of financial institutions around the world.
According to a joint report by software security firm McAfee and Guardian Analytics, more
than 60 firms have suffered from what it has called an "insider level of understanding".
"The fraudsters' objective in these attacks is to siphon large amounts from high balance
accounts, hence the name chosen for this research - Operation High Roller," the report said.
"If all of the attempted fraud campaigns were as successful as the Netherlands example we
describe in this report, the total attempted fraud could be as high as 2bn euro (1.6bn)."
The automated malicious software programme was discovered to use servers to process
thousands of attempted thefts from both commercial firms and private individuals.
The stolen money was then sent to so-called mule accounts in caches of a few hundreds and
100,000 euro (80,000) at a time.
Credit unions, large multinational banks and regional banks have all been attacked.
Sky News defence and security editor Sam Kiley said: "It does include British financial
institutions and has jumped over to North America and South America.
"What they have done differently from routine attacks is that they have got into the bank
servers and constructed software that is automated.
"It can get around some of the mechanisms that alert the banking system to abnormal
The details of the global fraud come just a day after the MI5 boss warned of the new cyber
security threat to UK business.
McAfee researchers have been able to track the global fraud, which still continues, across
countries and continents.
"They have identified 60 different servers, many of them in Russia, and they have identified
one alone that has been used to steal 60m euro," Kiley said.
"There are dozens of servers still grinding away at this fraud in effect stealing money."
Nieuwe Broadwellchips nog dit jaar
Door Sven Rietkerk
19 mei 2014 11:01

Computers met de nieuwe Broadwellchip moeten
nog dit jaar in de winkels liggen. Helaas gaat de
chip een release in september niet meer halen. Dit
vertelt directeur Brian Krzanich tegenover Reuters.
De nieuwe chips werken met transistors die 14
nanometer 'groot' zijn in plaats van 22 nanometer.
Daardoor passen er meer transistors op n chip.
Dit zorgt voor meer rekenkracht in de chips. Door
de Broadwellchips moeten PC's sneller en
energiezuiniger worden.
Afgelopen oktober werd de nieuwe chip al aangekondigd, maar door technische problemen
liep de chip flinke vertraging op. Rond september worden er meer PC's en laptops verkocht
dan in de rest van het jaar helaas haalt de nieuwe Intelchip die periode niet. Dan moeten ze in
juli of augustus echt verkrijgbaar zijn, dat wordt moeilijk.

CNN. (2013, juni 17). Hacker: FBI violated 4th amendment rights . Opgeroepen op mei 18, 2014, van
Stock Footage. (2011, oktober 2). Close up shot of a man typing on a laptop keyboard. Opgeroepen
op mei 18, 2014, van Youtube:
Stock Footage. (2011, oktober 7). Dolly shot of people working on computers. Opgeroepen op mei 18,
2014, van Youtube:

Filmpje begint, ik spring in het beeld.
Hallo daar, mijn naam is Leander en vandaag gaan we het hebben over computerhacking.
Titelkaart verschijnt.
Nu wat is computerhacking of hacking in het algemeen eigenlijk?
Afbeelding van een stereotype hacker verschijnt op het scherm.
Een hacker is iemand die op een niet toegestane of normaal niet mogelijke manier binnenraakt in een
computer of een computernetwerk.
De Engelstalige termen White hats en Black hats verschijnen op scherm tijdens de volgende zin.
De term hacker kan voor allerlei doeleindeng gebruikt worden maar over het algemeen spreken we
over witte hoeden en zwarte hoeden als we het over hackers hebben.
Volgende tekst is een voice-over geplaatst op een dolly-shot van mensen die aan computers
De witte hoeden zijn degene die voor een beveiligingsfirma werken: zij proberen tegen betaling, met
voorkennis van de eigenaar een netwerk of computer to hacken om de beveiliging te testen en de
eigenaar te kunnen vertellen aan welke delen van de beveiliging er nog werk is en welke delen al goed
Ik kom terug in beeld. Ik begin uit te leggen over zwarte hoeden. Halverwege komen er
screenshots van internetartikels in beeld om mijn uitleg te ondersteunen.
Aan de andere kant hebben we dus de zwarte hoeden, dit zijn de echt cybercriminelen die op een
netwerk of computer inbreken om de info die ze daar verkrijgen zelf te gebruiken of te misbruiken of
om deze door te verkopen aan andere partijen.
De straffen die hierop staan worden steeds zwaarder en zwaarder en soms is dit ook niet terecht. Zo
hebben we het verhaal van de 18 jarige Eric Lostutter (foto van Eric komt in beeld) die op zijn
schoolwebsite door middel van hacking bewijs vond dat er een verkrachting had plaatsgevonden en
dat deze was verzwegen door de leerkrachten omdat de daders enkele hooggeplaatste leden van het
footballteam waren.
Eerst afbeelding van artikel over de verkrachting. Dan een fragment van een interview met Eric van
CNN. Het geluid is hieruit geknipt en de volgende tekst is weer een voice-over.
Eric zette deze informatie anoniem op het internet. Enkele dagen na dat hij dit had gedaan stopte er
een busje van de Amerikaans beveiligingsdienst voor zijn deur. Daaruit stapte een heel SWAT team
dat direct zijn huis binnenstormde, zowel hij als zijn broer en zijn broers vrienden werden gearresteerd
en het duurde hem maanden om zijn bezittingen terug te krijgen.

Ik kom weer in beeld.
Eric kan nu tot 10 jaar in de gevangenis krijgen terwijl de verkrachters veel minder zullen krijgen. Is dit
eerlijk? Neen. Is dit nodig? Misschien wel, dat laat ik aan jullie over om te beslissen. Cybercriminaliteit
stijgt de laatste jaren alleen maar en het computerlandschap verandert ook constant. (shot van man
die typt)En terwijl verhalen zoals dat van Eric Lostutter wel onbegrip en ongeloof opwekken, zijn er
tegelijkertijd ook verhalen van mensen die hun zuurverdiende spaarcenten zien verdwijnen door
hackers.(internet artikels worden weer getoond) Het is een probleem dat nog een lange tijd gaat
blijven bestaan en waar we ook niet echt een oplossing voor hebben. De computer gaat nog lang in
ons leven blijven en daarom hacking waarschijnlijk ook.
Ik kom weer in beeld.
Zo, dat was wat korte uitleg over hacken, hopelijk hebben jullie er iets van opgestoken.
Mijn naam is Leander Duthoy, en tot ziens op het internet.
De aftiteling begint. Muziek op de achtergrond is Going Down van Jake Chudnow