33
Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 1 From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business An Economic Impact Study for Risk Assessment Jack L. Worsham

From Phone Phreaking to Cyber War: Cyber Crime’s Impactit-professional.vpweb.com/upload/From Phone Phreaking to Cyber W… · Running head: From Phone Phreaking to Cyber War:

  • Upload
    lamphuc

  • View
    219

  • Download
    0

Embed Size (px)

Citation preview

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 1

From Phone Phreaking to Cyber War: Cyber Crime’s Impact

on Business

An Economic Impact Study for Risk Assessment

Jack L. Worsham

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 2

Abstract

This paper presents an examination of some of the earliest cyber crimes: hacking, phone

phreaking, and cracking. The paper presents a historical view of how each type of cyber

crime began, how it was viewed, and what it intended to accomplish. This is the beginning

of a much larger project that will examine all cyber crimes and how each has impacted

business. The purpose is to present the historical context, the why, and the target of cyber

crimes in order for network managers and network security personnel to perform a more

accurate risk analysis and risk management of their network assets. The more aware

businesses are of different cyber crimes the more selective they can target their

countermeasures and save on their IT security budgets.

The literature review and annotated bibliography will analyze different secondary sources

to demonstrate the different articles that were considered and how the usefulness of an

article was determined.

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 3

Table of Contents

Abstract .................................................................................................................................. 2

Introduction ............................................................................................................................ 4

From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business .......................... 5

Background ............................................................................................................................ 5

The Dawn of the Phone Phreak ............................................................................. 6

Rise of the Cracker............................................................................................... 11

Literature Reviews ............................................................................................... 14

Article Summaries ............................................................................................... 15

Research Article Comparisons ............................................................................. 18

Research Article Strengths and Weaknesses ....................................................... 19

Research Field Applications ................................................................................ 21

Topic Coverage Differences ................................................................................ 22

Conclusion ........................................................................................................................... 24

Bibliography ........................................................................................................................ 26

Annotated Bibliography ....................................................................................................... 28

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 4

Introduction

This paper examines different cyber crimes, cyber criminals, techniques and targets

by comparing different articles and then demonstrating the criteria used for determining

secondary source suitability. The following questionnaire was used to determine the

aptness of secondary articles for scholarly research:

Was the article a book review or editorial?

Was a peer review statement present?

Did the article include references, footnotes, or a bibliography?

Was the article longer than 5 pages?

Did the article report new academic research studies, including methodology

and data analysis?

Did the article give the author’s title, affiliation, and contact information?

Did the article have very few advertisements or images in print or PDF

version?

Was the article relevant?

What is the result of the believing and doubting test?

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 5

From Phone Phreaking to Cyber War: Cyber Crime’s Impact

on Business

Background

Network users, business managers, and IT staff need to understand the different

cyber crimes and their related targets in order to plan their countermeasures.

Different cyber crimes have different targets. Some of the first cyber crimes were

actually intended to help the general public. At the beginning of the computer age smart

hardware and software hobbyists wanted to improve how their computers operated.

Techniques were passed down to help other enthusiasts until certain improvements became

common knowledge. These early underground engineers became known as hackers. Some

would argue that these hackers stole business opportunities from hardware and software

companies. Some argue that without these hackers the number of computer users would

have been dramatically less. In fact, the argument claims that hackers created the computer

business.

Trigaux (2006), in the article “History of Hacking” in the St. Petersburg Times,

summarized the different hacker mindsets when he said, “Depending on whom you ask,

hackers are harmless pranksters, curious techies, noble freedom fighters or dangerously

unpredictable cyber-terrorists (see figure 1: How Hackers See Themselves). As the world

goes online, hackers' potential influence and menace grows.”

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 6

Figure 1: How Hackers See Themselves

Source: Daryl Cagle’s Professional Cartoonists Index

The Dawn of the Phone Phreak

The precursor to the modern day hacker was a group of underground electronic

hobbyists known as phone phreakers. The term phone phreaking came from the phrase

“free use of the phone.” Phone phreaking is a set of methods used to manipulate the phone

system. The first phone phreakers were curious about the way the phone system worked.

However, after its initial beginning phone phreaking became a means to protest, impress

friends, and access free phone service.

Three key events fueled the movement known as phone phreaking. One key event

that began phone phreaking was AT&T’s decision to replace human operators with a

computerized system using control tones. Phone phreaking is impossible with human

operators. However, after AT&T replaced human operators with computers, control tones

started being used to route phone calls. Phone phreakers artificially generate these tones to

take over control of the phone system.

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 7

Another key factor was the Vietnam War. Anti-establishment feelings were

growing and the phone phreaks used their abilities to attack the phone company. The more

unpopular the war became the easier it was for phone phreaks to justify the illegal use of

phone company facilities.

The last key factor in the birth of the phone phreak was the rate phone companies

charged for long distance calls. When phone phreaking was in its golden age, long distance

calls were very expensive. This created a condition that Meredith (2003) in the article

“Phone Phreaking,” called the ““Robin Hood Syndrome.” Phone phreaks saw themselves

as noble patriots rather than as thieves.”

Hundreds of switching stations make up the phone system. Thousands of trunk lines

link the switching stations together and the trunk lines carry control signals called master

tones between the switching stations. Switching stations transmit these master tones to

signal the status of a trunk line. For example, a 2600 Hz tone indicates that a trunk line is

currently unused. Therefore, if phone phreaks produce the proper control tones at the

proper time they can cause the telephone system to do their bidding. Different techniques

were discovered by underground engineers either accidently or by calling phone relay

stations posing as linemen.

Joe Engressia, a.k.a. “the whistler,” explained in a documentary entitled The Secret

History of Hacking how he accidentally learned about the telephone systems control tones:

One day I was whistling while talking to my grandmother on the phone when the

line went dead. After repeated trials, I noticed that the phone went dead every time I

whistled this particular tune. I called AT&T labs and an engineer explained to me

how the 2600 Hz. tone works. Continuing to play with this tune, I also learned that

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 8

if I subsequently dialed another number I could call anywhere in the world without

charge. (King, 2002)

Denny Teresi made a new contribution to phone phreaking. He mastered the art of

Social Engineering. Social Engineering was the technique of getting phone company

employees to tell classified information about how the phone company operates. Denny

would pose as a phone company employee to get any routing information he wanted.

Denny Teresi had been phone phreaking for years when he introduced an engineering

student named John Draper to this underground world.

Christine (1995) explains how John Draper became known as “Captain Crunch”

when he stated:

One noted phone phreaker was named “Captain Crunch” after the whistle he

obtained and used from the cereal of the same name (see figure 2 John Draper and

figure 3 Captain Crunch Whistle). The whistle was tuned to 2,600 cycles which,

when blown over a telephone receiver, created just the right pitch to illicitly access

toll-free telephone lines.

Figure 2: John Draper Figure 3: Captain Crunch Whistle

Source: The Secret History of Hacking Source: Jack Worsham’s personal collection

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business 9

John Draper, a.k.a. “Captain Crunch,” noticed that phone lines would go dead

whenever he played his whistle. This led him to reading everything he could about how the

phone system works. One day while reading, in the engineering library of the University of

California at Berkeley, he came across an article about the phone system’s control codes.

The article explained how the phone system combines different frequencies to produce

numbers and control codes. The article listed all of the control tones. As the legend goes,

hours after reading the article John Draper had invented the Blue Box (see figure 4: Blue

Box), which reproduced the phone system’s control codes and tones.

Figure 4 Blue Box

Source: Google Images

Steve Wozniak’s interest in phone phreaking began after he read an article in

Esquire magazine entitled “Secrets of the Little Blue Box.” In the documentary The Secret

History of Hacking, Steve Wozniak explained his introduction to phone phreaking:

After I built the blue box, I needed someone to teach me how to use it. I started

searching for John Draper. I called all the underground radio stations until I tracked

him down and got him to agree to meet me at my dorm room at California Berkley.

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business10

I felt like I was about to meet the president. When I met him, I felt like I was talking

to a hero. We proceeded to call the pope. (King, 2002)

Meredith (2003), in the article “Phone Phreaking,” explained the general attitude of

the phreaking subculture in its beginning when he wrote, “Phreaking was a semi-

respectable activity. Among hackers there was a gentleman’s agreement that phreaking was

an intellectual game; a form of exploration was OK, but serious theft of services was

taboo.”

The new popularity of phone phreaking drew the attention of a writer by the name

of Ron Rosenbaum. The subsequent article he wrote, “Secrets of the Little Blue Box,” for

Esquire Magazine, changed phone phreaking forever. In this article, he interviewed a

person named Al Gilbertson, who later admitted that his real name was John Draper. In the

article, he explained how the blue box could give its operator the ability to call a

neighboring phone by routing the call around the world, and the Blue Box was becoming

so popular that he and some friends were all ready filling orders to build Blue Boxes.

The release of the magazine article, “The Secrets of the Little Blue Box,” coupled

with the Vietnam War and the federal surtax on long distance phone calls caused phone

phreaking to become more sinister. The magazine article made phone phreaking more

popular, the Vietnam War and the federal surtax on long distance phones calls fanned the

flames of protest.

Heaton (2000), in the article “Hacker History,” wrote about the general attitude of

the phreaking subculture after it became more menacing:

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business11

The phreaking movement developed a subculture with anti-establishment virtues.

The icon of counter-culture, Abbie Hoffman spread the word about phreaking in his

newsletter Youth International Party Line. “Ma’Bell”, as the phone company was

referred to, was a favorite target. Ripping off the phone company became a protest

for the liberation of technology.

The blue box made stealing telephone service easy, perhaps a little too easy. What

was once a relatively small group of underground engineers became an uncontrollable mob.

So many people were using the blue box to steal long distance telephone access that AT&T

lobbied congress to put an end to phone phreaking. To curb the illegal use of the phone

system the federal government passed Title 18. Title 18 of the United States Code section

1029 which made the use and ownership of phone phreaking boxes illegal.

Rise of the Cracker

The January 1975 issue of Popular Electronics introduced the world to what some

consider the first personal computer, the Altair (see figure 5: Altair 8800). Hobbyists and

phone phreakers at a company named Micro Instrumentation and Telemetry Systems

(MITS) invented the Altair. After the emergence of the Altair, many of the phone phreakers

formed a computer club called Homebrew. At the computer club meetings, people would

share their thoughts and ideas about computers.

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business12

Figure 5: Altair 8800

Source: Google Images

However, not everyone was into sharing. One member of Homebrew, Bill Gates

(see figure 6: Bill Gates), wrote in a letter called “An Open Letter to Hobbyist” and in it he

wrote:

As the majority of hobbyists must be aware, most of you steal your software.

Hardware must be paid for, but software is something to share. Who cares if the

people who worked on it get paid? Most directly, the thing you do is theft. (Shustek,

2006)

Bill Gates’ letter changed many hackers’ standpoint about sharing knowledge. In

addition, Steve Wozniak invented the Apple 1 computer (see figure 7: Apple 1 Computer)

and with friend, Steve Jobs started the company Apple Computer. The competitive side of

computing made it necessary to keep secrets. Since everyone was becoming secretive, no

one would share information. If no one shared information, then there was no reason for the

Homebrew computer club. This led to the dissolving of the Homebrew computer club, but

in its wake, former members had started 23 different computer companies. The hacker was

now an outlaw, and the focus changed from exploration to exploitation. The hacker became

a cracker.

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business13

Figure 6: Bill Gates Figure 7: Apple 1 Computer

Source: Google Images Source: Google Images

Crackers made computer intrusion much more menacing. Crackers turn an honest

attempt to help people to pure destruction. Sending malware like viruses, worms, and

Trojans, led to denial of service attacks, piggy backing, and man-in-the-middle attacks

which were meant to harm without any socially redeeming value. Then the game became

even more serious with monetary schemes like phishing and identity theft. Identity thieves

gain illegal access to networks for the sole purpose of stealing personal information. New

social networking web sites have made identity theft a very lucrative crime. Most of these

web sites have very little security, provide the criminal with plenty of personal information,

and provide the criminal cyber stealth. A recent identify theft crime was solved when the

criminal was caught selling a large number of identities. McMillan (2010), cyber crime

reporter, wrote:

Facebook has identified the hacker named Kirllos who tried to sell 1.5 million

Facebook accounts recently in underground hacking forums. Kirllos was first

spotted by researchers at VeriSign's iDefense group a few weeks after he claimed to

have an unusually large number of Facebook accounts for sale at rock-bottom

prices. According to VeriSign, Kirllos wanted between $25 and $45 per 1,000

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business14

accounts, depending on the quality of the Facebook user's connections. Kirllos

appeared to have sold close to 700,000 accounts.

As the technology of database access progresses so does new cyber crime

opportunities. `Crackers have begun to branch out to even more extreme enterprises.

Specialists like: hack-activists and cyber-terrorists have staked out even more ruthless

territory.

Literature Reviews

The following questionnaire was used to determine the aptness of secondary

articles for scholarly research:

Was the article a book review or editorial?

Was a peer review statement present?

Did the article include references, footnotes, or a bibliography?

Was the article longer than 5 pages?

Did the article report new academic research studies, including methodology

and data analysis?

Did the article give the author’s title, affiliation, and contact information?

Did the article have very few advertisements or images in print or PDF

version?

Was the article relevant?

What is the result of the believing and doubting test?

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business15

Article Summaries

The following articles were used strictly to depict a photo or cartoon art:

Asay, C. (2006, September 7). Daryl Cagle's Professional Cartoonists Index. Retrieved

May 18, 2010, from http://cagle.com/news/EvilEmailHackers/6.asp

Google Apple 1. (n.d.). Retrieved June 1, 2010, from Google Images:

http://www.google.com/imgres?imgurl=http://upload.wikimedia.org/wikipedia/com

mons/b/be/Apple_1_computer.jpg&imgrefurl=http://commons.wikimedia.org/wiki/

File:Apple_1_computer.jpg&h=300&w=400&sz=41&tbnid=dqc07Rx6pVj6aM:&t

bnh=93&tbnw=124&prev=/images%3Fq%3DA

Google Altair 8800. (n.d.). Retrieved June 1, 2010, from Google Images:

http://www.google.com/imgres?imgurl=http://chandrakantha.com/articles/indian_m

usic/filmi_sangeet/media/1975_altair8800.jpg&imgrefurl=http://chandrakantha.com

/articles/indian_music/filmi_sangeet/film_song_1975.html&h=240&w=350&sz=23

&tbnid=gVQyflfr-LgdeM:&t

Google Bill Gates. (n.d.). Retrieved June 1, 2010, from Google Images:

http://www.google.com/imgres?imgurl=http://download.microsoft.com/download/d

/a/1/da1340ec-3833-480b-aa53-

d04c61858979/Bill_Gates.jpg&imgrefurl=http://chinadigitaltimes.net/china/bill-

gates/&h=1181&w=1181&sz=992&tbnid=RZuYA5qTBupA4M:&tbnh=150&tbnw

=150&prev

Google Blue Box. (n.d.). Retrieved June 1, 2010, from Google Images:

http://www.google.com/images?q=blue+box&oe=utf-8&rls=org.mozilla:en-

US:official&client=firefox-a&um=1&ie=UTF-

8&source=univ&ei=WCsJTPC_NcP68Ab44JFs&sa=X&oi=image_result_group&c

t=title&resnum=4&ved=0CDgQsAQwAw.

These previous five articles are used to depict a picture or mood that this paper was

describing and thus was used solely for enhancing the written descriptions.

Christine, B. (1995). Computers under the hack attack. Risk Management, 42(3), 49.

Retrieved May 12, 2010, from ABI/INFORM Global. (Document ID: 5355123).

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business16

This peer-reviewed article has much valuable research for its day. It is very

believable article and valuable at the time of printing. This excellent article has lost value

due to the information being dated.

Devos, J., & Pipan, I.. (2009). The role of IT/IS in combating fraud in the payment card

industry. Journal of Internet Banking and Commerce, 14(3), 1-17. Retrieved May

4, 2010, from ABI/INFORM Global. (Document ID: 1951883981).

This peer reviewed article is very valuable and will become one of the backbone

articles used for researching modern cyber crimes.

Heaton, J. (2000, December 8). Hacker History. Retrieved May 20, 2010, from

http://www.slais.ubc.ca/people/students/student-projects/J_Heaton/

This non-peer-reviewed article is very valuable if used in a very limited fashion.

The article is only used to put early cyber crimes into historical perspective. It would not

be considered scholarly but it is very believable.

King, M. (Producer). (2002). The Secret History of Hacking [Motion picture]. England:

September Films for Channel 4 & TLC.

This documentary is not peer-reviewed but is very valuable because it actually

shows and interviews some of the earliest cyber criminals, cyber investigators, and cyber

crimes.

McMillan, R. (2010, May 13). Facebook IDs hacker who tried to sell 1.5M accounts -

Computerworld. Retrieved May 14, 2010, from

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business17

http://www.computerworld.com/s/article/9176744/Facebook_IDs_hacker_who_trie

d_to_sell_1.5M_accounts?taxonomyId=82

This non-peer-reviewed article had very limited value even though it is very timely.

The article was neither well done nor believable. Things stated as undeniable fact at the

beginning of the article was questioned by the author at the end of the article. This made

the article totally unbelievable and very poorly written.

Meredith, M. (2003, April). Phone Phreaking. Retrieved May 18, 2010, from

http://www.iejs.com/TechnologyandCrime/phone_phreaking.htm

This non-peer-reviewed article had very limited research value. The article was

well written and believable.

Rosenbaum, R. (1971, October). Secrets of the Little Blue Box. Retrieved May 18, 2010,

from http://www.webcrunchers.com/crunch/esq-art.html

This is a non-peer reviewed magazine article that changed the world of cyber crime.

Many people learned how to build blue boxes which took hacking from underground

engineers that wanted to help people to the general public that was more apt to commit

frauds.

Shustek, L. (2006). Homebrew Computer Club Newsletter volume 3, Issue Extract of Bill

Gate's Open Letter to Hobbyists. Retrieved June 1, 2010, from DigiBarn Computer

Museum:

http://www.digibarn.com/collections/newsletters/homebrew/V2_01/gatesletter.html

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business18

This non peer-reviewed article contains a historic document written by Bill Gates.

The letter may be at least partially responsible for launching the software industry as it is

today. The letter is a very important historical document in the history of computers and

cyber crime.

Srivastava, R. (2007). Customer's perception on usage of internet banking. Innovative

Marketing, 3(4), 66-72,137. Retrieved May 4, 2010, from ABI/INFORM Global.

(Document ID: 1533911821).

This article was peer reviewed and was an excellent research article on the general

populations’ perception of internet banking. It shows how internet banking is becoming

more acceptable.

Trigaux, R. (2000). A History of Hacking. St. Petersburg Times. Retrieved May,20 2010,

from http://www.sptimes.com/Hackers/history.hacking.html

This article is non-peer-reviewed newspaper article. It describes the perspective of

the early days of cyber crime.

Research Article Comparisons

The first five articles listed are graphics used to enhance the written descriptions

and have limited scholarly value.

The Christine, B. (1995). Article was very relevant once but shows how dated

material can lose its relevance over time.

Unlike the previous articles, the Devos, J., & Pipan, I.. (2009). Article is peer-

reviewed and very relevant.

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business19

The Heaton, J. (2000) article is not peer-reviewed but is believable. It has very

limited research value and is only being used to place historical perspective to cyber

crimes.

The King, M. (Producer). (2002).documentary shows a balanced depiction of

historical events. It has limited scholarly value but is very believable and very well

produced.

McMillan, R. (2010) news article was very timely but poorly written. It lost

relativity and believeability.

The Meredith, M. (2003) article is non-peer-reviewed and has very limited research

value. It was well written and somewhat believable for historical perspective.

The Rosenbaum, R. (1971) article is non-peer-reviewed but is historic in its effect

on the hacking community.

The Shustek, L. (2006) article is not peer-reviewed but is historically significant to

the cyber crime or computer community.

The Srivastava, R.. (2007).article is peer-reviewed and very scholarly. The article

is very relevant and very believable.

The Trigaux, R. (2000).newspaper article was non-peer-reviewed and has limited

scholarly value. It is only used for its historic perspective.

Research Article Strengths and Weaknesses

It was felt that the first five articles help identify the mood, object, or person being

described and did not need extraordinary research value.

The Christine, B. (1995). Article was very well researched and written its only

weakness is its lost value due to time.

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business20

The Devos, J., & Pipan, I.. (2009). Article was very well researched and written. It

will become a very valuable article for the final project.

The Heaton, J. (2000) article is not peer-reviewed but is well written and very

believable.

The King, M. (Producer). (2002).documentary is not peer reviewed but very

believable. It is very difficult to deny information when the criminals and investigators

agree on historical information.

The McMillan, R. (2010 news article was very timely but poorly written. It has no

scholarly value.

The Meredith, M. (2003) article was not peer-reviewed but was well written and

believable.

The Rosenbaum, R. (1971) article was not-peer-reviewed but very important

historically and should still be used for any academic research on the subject of cyber

crime.

The Shustek, L. (2006) article was not peer-reviewed and is not scholarly but is

historically important containing a letter from Bill Gates.

The Srivastava, R. (2007).article about internet banking will become a keystone

article in the final project. The article is very well written and researched and very

believable.

The Trigaux, R. (2000).article is well written and believable but is non-peer-

reviewed and has limited scholarly value

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business21

Research Field Applications

The research field applications of the first five articles are for identification of the

mood, object, or person only.

The Christine, B. (1995).article would have very limited current research

applications

The Devos, J., & Pipan, I.. (2009).article should be mandatory reading for all

personnel in charge of credit card or identity theft security.

The Heaton, J. (2000) article is used for very limited historical perspective

applications.

The King, M. (Producer). (2002). Documentary could be viewed by anyone that

wants historical perspective of cyber crimes and would need to research criminal

techniques.

The McMillan, R. (2010) news article could be used as an example of how not to

write articles.

The Meredith, M. (2003) article has limited research value. It was used only for its

historical perspective.

The Rosenbaum, R. (1971) article should be reviewed by anyone interested in the

history of cyber crime or would like to have a historical perspective on cyber crime.

The Shustek, L. (2006). article would be important to anyone that wants a historical

perspective on computers, cyber crime, and software development.

The Srivastava, R. (2007).article would be very useful for anyone that is studying

internet banking or network security issues.

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business22

The Trigaux, R. (2000). Article has very limited research value. It is being used

very narrowly to give historic perspective.

Topic Coverage Differences

The topic coverage of the first five articles is for identification of mood, object, or

person only.

The Christine, B. (1995).article was scholarly and very relevant for its day.

The Devos, J., & Pipan, I.. (2009).article focuses on one topic and covers it very

well and very scholarly.

The Heaton, J. (2000) article is not as scholarly as peer \-reviewed articles but is

somewhat relevant due to the type of information covered is not time dependant.

The King, M. (Producer). (2002). Documentary is not peer-reviewed but is

somewhat relevant for historical purposes and it is hard to deny information that criminals

and investigators both agree.

The McMillan, R. (2010) news article must have been rushed and sources and facts

should have been checked thoroughly before publication.

The Meredith, M. (2003) article showed historical perspective and therefore is

timely but limited for any modern cyber crimes.

The Rosenbaum, R. (1971)not peer reviewed but contains important research

information on cyber crime.

The Shustek, L. (2006) article was not peer-reviewed but has important historical

information.

The Srivastava, R. (2007).article is very well researched and is very important in

the research of cyber crimes impact on business.

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business23

The Trigaux, R. (2000).news paper article is not peer-reviewed but was well

written. It has limited scholarly value. It was used only for historic perspective.

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business24

Conclusion

.The more business managers and IT staffs understand cyber crimes and cyber

criminals the more network security personnel will be able to target their security

countermeasures. Should business waste money on cyber hoaxes? Should business waste

money on cyber crimes that do not impact their business type? This project attempts to

measure the real impact of cyber crimes by identifying cyber crime targets and hoaxes.

With any research sources are needed. When examining secondary sources special

care must be taken. Scholarly work must be supported with plenty of sources but these

sources must have integrity, reliability, and validity. The author must generate a test that

all sources must pass before they can be used. Only after passing careful scrutiny is the

supporting reference to be used. Once a document loses integrity it is nearly impossible to

regain.-

Where is the current state of research on cyber crime? Plenty of cyber crime

historical and background information exists. Accurate crime statistics are missing. Many

questions need to be answered such as:

What is the real economic impact cyber crime has on business?

If thousands of credit cards are stolen each year, how much do banks lose

monetarily?

How much money is lost do to identity theft each year?

What is the chances the average person will be a victim of identity theft?

What types of cyber crimes are more common for (different types of

businesses)?

What is the typical impact for each instance of ID theft?

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business25

Should the average person worry about ID theft?

What is the impact of cyber terrorism?

What would be the impact of a cyber war?

What would be the impact on business if cyber terrorist took over a SCADA

system?

How much of cyber crime is real and how much of cyber crime is hype?

The next step is to continue gathering secondary sources to broaden and deepen the

cyber crime research and then to collect primary data through phone interviews, surveys,

and the release of raw data collected by the U.S. Federal Government through the freedom

of information act. Data must be scrutinized to maintain integrity. Many different primary

sources must be used to update, cross-check, and ensure data integrity. Primary source

privacy will be maintained to ensure the best data possible.

At the end of the project businesses will have real qualitative and quantitative data

to design database and network security systems.

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business26

Bibliography

Asay, C. (2006, September 7). Daryl Cagle's Professional Cartoonists Index. Retrieved

May 18, 2010, from http://cagle.com/news/EvilEmailHackers/6.asp.

Christine, B. (1995). Computers under the hack attack. Risk Management, 42(3), 49.

Retrieved May 12, 2010, from ABI/INFORM Global. (Document ID: 5355123)..

Devos, J., & Pipan, I.. (2009). The role of IT/IS in combating fraud in the payment card

industry. Journal of Internet Banking and Commerce, 14(3), 1-17. Retrieved May

4, 2010, from ABI/INFORM Global. (Document ID: 1951883981)..

Google Apple 1. (n.d.). Retrieved June 1, 2010, from Google Images:

http://www.google.com/imgres?imgurl=http://upload.wikimedia.org/wikipedia/com

mons/b/be/Apple_1_computer.jpg&imgrefurl=http://commons.wikimedia.org/wiki/

File:Apple_1_computer.jpg&h=300&w=400&sz=41&tbnid=dqc07Rx6pVj6aM:&t

bnh=93&tbnw=124&prev=/images%3Fq%3DA.

Google Altair 8800. (n.d.). Retrieved June 1, 2010, from Google Images:

http://www.google.com/imgres?imgurl=http://chandrakantha.com/articles/indian_m

usic/filmi_sangeet/media/1975_altair8800.jpg&imgrefurl=http://chandrakantha.com

/articles/indian_music/filmi_sangeet/film_song_1975.html&h=240&w=350&sz=23

&tbnid=gVQyflfr-LgdeM:&t.

Google Bill Gates. (n.d.). Retrieved June 1, 2010, from Google Images:

http://www.google.com/imgres?imgurl=http://download.microsoft.com/download/d

/a/1/da1340ec-3833-480b-aa53-

d04c61858979/Bill_Gates.jpg&imgrefurl=http://chinadigitaltimes.net/china/bill-

gates/&h=1181&w=1181&sz=992&tbnid=RZuYA5qTBupA4M:&tbnh=150&tbnw

=150&prev.

Google Blue Box. (n.d.). Retrieved June 1, 2010, from Google Images:

http://www.google.com/images?q=blue+box&oe=utf-8&rls=org.mozilla:en-

US:official&client=firefox-a&um=1&ie=UTF-

8&source=univ&ei=WCsJTPC_NcP68Ab44JFs&sa=X&oi=image_result_group&c

t=title&resnum=4&ved=0CDgQsAQwAw.

Heaton, J. (2000, December 8). Hacker History. Retrieved May 20, 2010, from

http://www.slais.ubc.ca/people/students/student-projects/J_Heaton/.

King, M. (Producer). (2002). The Secret History of Hacking [Motion picture]. England:

September Films for Channel 4 & TLC.

McMillan, R. (2010, May 13). Facebook IDs hacker who tried to sell 1.5M accounts -

Computerworld. Retrieved May 14, 2010, from

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business27

http://www.computerworld.com/s/article/9176744/Facebook_IDs_hacker_who_trie

d_to_sell_1.5M_accounts?taxonomyId=82.

Meredith, M. (2003, April). Phone Phreaking. Retrieved May 18, 2010, from

http://www.iejs.com/TechnologyandCrime/phone_phreaking.htm.

Rosenbaum, R. (1971, October). Secrets of the Little Blue Box. Retrieved May 18, 2010,

from http://www.webcrunchers.com/crunch/esq-art.html.

Shustek, L. (2006). Extract of Bill Gate's open letter to hobbyists. Homebrew Computer

Club Newsletter volume 3, Issue Retrieved June 1, 2010, from DigidBarn Computer

Museum:

http://www.digibarn.com/collections/newsletters/homebrew/V2_01/gatesletter.html.

Srivastava, R.. (2007). Customer's perception on usage of internet banking. Innovative

Marketing, 3(4), 66-72,137. Retrieved May 4, 2010, from ABI/INFORM Global.

(Document ID: 1533911821).

Trigaux, R. (2000). A history of hacking. St. Petersburg Times. Retrieved May,20 2010,

from http://www.sptimes.com/Hackers/history.hacking.html.

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business28

Annotated Bibliography

Asay, C. (2006, September 7). Daryl Cagle's Professional Cartoonists Index. Retrieved

May 18, 2010, from http://cagle.com/news/EvilEmailHackers/6.asp.

Asay, C. (2006) produced a cartoon depicting different views of how hackers see

themselves and how the public views hackers. It is an excellent example of how a

picture can say a thousand words and how many hackers feels that they are doing

the world a service while the world just views them as thieves. It is good for telling

the IT field that sometimes the view employers and others have of them is different

than they have of themselves. This can be very useful especially to those that are

new to IT. It is not peer-reviewed but depicts feelings that are easily verified and

therefore is still useful for this limited purpose.

Baars, H., & Kemper, H. G. (2008). Management support with structured and unstructured

data and integrated business framework. Information Systems Management, 25(2),

132–148.

Baars, H.(2008) describes the role of how unstructured data can be used to add

granularity to structured data. It also describes possible methods to improve data

mining and data classification. It is an excellent peer-reviewed article concerning

data and how it can be used to improve business intelligence. IT and busine.ss data

managers could use this article to improve their database management systems.

Software engineers could use the improvement methods to design better data

mining systems

Christine, B. (1995). Computers under the hack attack. Risk Management, 42(3), 49.

Retrieved May 12, 2010, from ABI/INFORM Global. (Document ID: 5355123).

Christine, B. (1995). Described hacking techniques and cyber crimes that were

most prominent in 1995. It is a peer-reviewed article that was well researched and

written. It would have been very credible for its day. Since 1995 cyber crimes

have changed and the article has only limited validity for today. It was used in this

paper for a very limited purpose: to describe a very old type of cyber crime that

was appropriate for the dated nature of the material. IT personnel may find it useful

for its historic value but not very pertinent for today.

Devos, J., & Pipan, I.. (2009). The role of IT/IS in combating fraud in the payment card

industry. Journal of Internet Banking and Commerce, 14(3), 1-17. Retrieved May

4, 2010, from ABI/INFORM Global. (Document ID: 1951883981).

Devos, J. (2009) described how IT security techniques could be used to combat card

fraud in the banking industry. It was also an excellent example of how to use

qualitative research methods supplemented with quantitative research to form a

mixed research methodology.-It is a scholarly peer reviewed article that is very

relevant for anyone responsible for combating credit card fraud. It should be

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business29

mandatory reading for all banking and IT security personal that interact with credit

card information. It is a very valuable peer-reviewed article that shows one of

today’s more prevalent cyber crimes. IT personnel that deal with credit card or

identity theft fraud would find this article very important.

Fabian, e. a. (2006). Virtualization in the enterprise. Intell Technology Journal , 10 (3), 227-

242.

Fabian, e. a. (2006). described how virtualization can present network problems.

An internal Intel Technology Journal that is not peer reviewed but has the input of

many experts that are highly respected in networking hardware and software. Many

articles depict virtualization as a win only panacea. This article points out the

virtualization needs to be considered very carefully. It is an excellent article for any

manager or IT staffer that is working for a company that is either considering

network virtualization or has converted to virtualization. One of the most important

articles current present on the topic of virtualization.

Google Apple 1. (n.d.). Retrieved June 1, 2010, from Google Images:

http://www.google.com/imgres?imgurl=http://upload.wikimedia.org/wikipedia/com

mons/b/be/Apple_1_computer.jpg&imgrefurl=http://commons.wikimedia.org/wiki/

File:Apple_1_computer.jpg&h=300&w=400&sz=41&tbnid=dqc07Rx6pVj6aM:&t

bnh=93&tbnw=124&prev=/images%3Fq%3DA.

Google Apple 1. (n.d.). depicts the picture of an Apple 1 computer. It is very useful

for all IT and computer enthusiasts that want to view a piece of computer history.

The original Apple 1 computer is very rare and is largely responsible for launching

the personal PC market. It is not peer-reviewed but is only being using for

identification purposes and if there is no arguments about the likeness it has

fulfilled it intended purpose..

Google Altair 8800. (n.d.). Retrieved June 1, 2010, from Google Images:

http://www.google.com/imgres?imgurl=http://chandrakantha.com/articles/indian_m

usic/filmi_sangeet/media/1975_altair8800.jpg&imgrefurl=http://chandrakantha.com

/articles/indian_music/filmi_sangeet/film_song_1975.html&h=240&w=350&sz=23

&tbnid=gVQyflfr-LgdeM:&t.

Google Altair 8800. (n.d.). depicts the picture of the Altair 8800. It is very useful

for all IT and computer enthusiasts that wan

t to view a piece of computer history. The Altair 8800 is reported by many to be the

first practical personal computer. IT is used merely to identify the appearance of

the Altair 8800. IT personal can experience increased awareness of their profession

by being familiar with its past.

Google Bill Gates. (n.d.). Retrieved June 1, 2010, from Google Images:

http://www.google.com/imgres?imgurl=http://download.microsoft.com/download/d

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business30

/a/1/da1340ec-3833-480b-aa53-

d04c61858979/Bill_Gates.jpg&imgrefurl=http://chinadigitaltimes.net/china/bill-

gates/&h=1181&w=1181&sz=992&tbnid=RZuYA5qTBupA4M:&tbnh=150&tbnw

=150&prev.

Google Bill Gates. (n.d.).depicts the picture of Bill Gates. Bill Gates is considered

by many as a founding father of modern computing. This reference is not peer-

reviewed but is used merely for the limited purpose of identifying Bill Gates. Bill

Gates is largely responsible for how software is marketed and sold today. IT

personel as well as software designers, engineers, and programmers owe, in large

regards, their careers to Bill Gates.

Google Blue Box. (n.d.). Retrieved June 1, 2010, from Google Images:

http://www.google.com/images?q=blue+box&oe=utf-8&rls=org.mozilla:en-

US:official&client=firefox-a&um=1&ie=UTF-

8&source=univ&ei=WCsJTPC_NcP68Ab44JFs&sa=X&oi=image_result_group&c

t=title&resnum=4&ved=0CDgQsAQwAw.

Google Blue Box. (n.d.). depicts the picture of the Blue Box. The blue box was one

of the first hacker tools ever used. IT personnel that wish to understand and get a

greater appreciation for modern hacking techniques would be interested in the

design and development of the blue box. Blue boxes are used today in a very

limited set of circumstances. The chances that an IT person would run across them

in the course of their normal affairs are limited. It is used mostly for its historic

value.

Heaton, J. (2000, December 8). Hacker History. Retrieved May 20, 2010, from

http://www.slais.ubc.ca/people/students/student-projects/J_Heaton/.

Heaton, J. (2000). described the historical perspective of cyber crimes. It is not

peer-reviewed but is valuable if used for limited reasons. The article places the

events of hacking into the context of what was going on in the United States at the

time. IT personnel with an interest in cyber crime history would find the article

valuable for historical perspective. Other than its historical perspective the article

shows very little cyber crime information that is important today.

Hoepfl, M., (n.d.). Choosing qualitative research: A primer for technology Education

Researchers -. Retrieved May 4, 2010, from

http://scholar.lib.vt.edu/ejournals/JTE/v9n1/hoepfl.html.

Hoepfl, M., (n.d.) described how technology research depends too much on

quantitative methods and would benefit from the depth of research that qualitative

research would provide. Used the excellent point that too much data without

context can lead to very dry research results. This is a very valuable peer-reviewed

article for anyone that is conducting research and is deciding on the methodology

they wish to use.

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business31

Jick, T. (1979, December). Mixing qualitative and quantitative methods: Triangulation in

action JSTOR: Administrative Science Quarterly, Vol. 24, No. 4 (Dec., 1979), pp.

602-611.. Retrieved May 6, 2010, from http://www.jstor.org/pss/2392366.

Jick, T. (1979.. described how qualitative and quantitative research methods should

be complementary and not competing. They should form a mixed research method

for best research on a subject. Made the excellent point that using both methods

does not have to mean twice as much work if used in a complementary fashion. A

dated but still very valuable article for anyone conducting research and is trying to

determine the type of methodology they will be using.

King, M. (Producer). (2002). The Secret History of Hacking [Motion picture]. England:

September Films for Channel 4 & TLC.

King, M. (Producer). (2002).this is a documentary depicting the early days of

hacking with many of the original characters. It gains a great deal of its value from

the fact that many of the more infamous persons involved in these early hacking

crimes were interviewed. Many of the tools and techniques as well as historical

perspective was presented. The criminal and investigator’s perspectives were

presented. It would be very valuable for any IT staffer that wishes to understand

the motivations and targets of the early cyber criminal.

McMillan, R. (2010, May 13). Facebook IDs hacker who tried to sell 1.5M accounts -

Computerworld. Retrieved May 14, 2010, from

http://www.computerworld.com/s/article/9176744/Facebook_IDs_hacker_who_trie

d_to_sell_1.5M_accounts?taxonomyId=82.

McMillan, R. (2010,) described the apprehending of a cyber criminal. It was

written for a trade journal and was not peer-reviewed. At first it appears to be a

creditable article but then it questions its own evidence as it soon falls apart. It was

tryintg to cover a very serious criminal but destroyed its own creditablitly. Not a

very useful article.

Meredith, M. (2003, April). Phone Phreaking. Retrieved May 18, 2010, from

http://www.iejs.com/TechnologyandCrime/phone_phreaking.htm.

Meredith, M. (2003)describes the culture of the United States during the sixties

when many anti-establishment forces were influencing early computer hobbyists.

Many people were tired of large long distance phone calls and were looking for

anyway to make free phone calls. It is not peer-reviewed and is only used in a

limited way to depict the mood of the country historically. Anyone interested in the

motivations behind cyber crimes may find the article useful. It has very limited

usefulness in scholarly research.

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business32

Rosenbaum, R. (1971, October). Secrets of the Little Blue Box. Retrieved May 18, 2010,

from http://www.webcrunchers.com/crunch/esq-art.html.

Rosenbaum, R. (1971) describes the origin and construction of the blue box.

Anyone that is researching the history of cyber crime would fined this article

invaluable. It is the article that changed phone phreaking forever. It is reported that

millions read the article and built their own blue boxes. The large number of popel

using blue boxes tipped off AT&T which started investigating, congress passed new

communications laws and many phone phreakers were arrested. This article led to

many people using technology just because they wanted to steal and vandalize.

This led to an entire change in cyber culture. On the other hand, Steve Wozniack

read the article, built his own blue box which started his interest in computing,

which led to the Apple 1.

Shustek, L. (2006). Extract of Bill Gate's open letter to hobbyists. .Homebrew Computer

Club Newsletter bolume 3, Issue Retrieved June 1, 2010, from DigidBarn Computer

Museum:

http://www.digibarn.com/collections/newsletters/homebrew/V2_01/gatesletter.html.

Shustek, L. (2006).describes the early meetings of the Homebrew computer club.

.In the early days after the release of the Altair 8800, many people formed a club to

discuss how to use this early computer. Software was freely given and traded until

one day Bill Gates wrote the infamous “Open Letter” which got many people to

start charging for software. Soon the Apple 1 was released and software and

hardware development became securiit. Anyone interested in the early days of

software development, Microsoft, or Bill Gates would find this article helpful. It is

not peer reviewed and should only be used for very limited scholarly research

purposes.

Srivastava, R.. (2007). Customer's perception on usage of internet banking. Innovative

Marketing, 3(4), 66-72,137. Retrieved May 4, 2010, from ABI/INFORM Global.

(Document ID: 1533911821)..

Srivastava, R.. (2007) described how the perception of internet banking has

changed over the last few years. It is also an excellent example of using qualitative

research methods (surveys and interviews) to conduct research. Researchers would

find this peer-reviewed article valuable as a source that shows how to use

qualitative research to compile data. To truly under4stand the why and how you

need to gather more information than just statistics.

Trigaux, R. (2000). A history of hacking. St. Petersburg Times. Retrieved May,20 2010,

from http://www.sptimes.com/Hackers/history.hacking.html.

Trigaux, R. (2000).describes some early cyber crime events. The article attempts to

show early cyber crimes from the criminal and investigators point of view. The

Running head: From Phone Phreaking to Cyber War: Cyber Crime’s Impact on Business33

article gives the cyber criminal much credit for the beginning of the computer age.

This is a newspaper article that is not peer reviewed and is used only to set historic

perspective. Scholars will find very limited research value.

Trochim, W., & Donnelly, J., (2008). The Research methods knowledge base, 3rd

Edition..

Atomic Dog/Cengage Learning Publshing. Mason, Ohio.

Trochim, W.(2008) described all the major stages of research. It was a very

through treatise on research, data collecting, and data analysis very important form

anyone conducting research. This article ia an invaluable treatise for anyone about

to embark on academic research. It is peer-reviewed, vary creditable, and

invaluable for researchers.