Attacks/Breaches
2/11/2014
01:30 PM
John Klossner
John Klossner
Commentary
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Cartoon: Identity Thieves

John Klossner has been drawing technology cartoons for more than 15 years. His work regularly appears in Computerworld and Federal Computer Week. His illustrations and cartoons have also been published in The New Yorker, Barron's, and The Wall Street Journal. Web site: ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Susan Fogarty
50%
50%
Susan Fogarty,
User Rank: Apprentice
2/12/2014 | 12:31:05 PM
Re: hacking vs robbing
I suppose clicking away with keyboard and mouse can't be considered "use of deadly force" and the victims of hacking are not harmed physically. Still, we might want to revisit penalties for cybercrime with all the data that can potentially be maliciously accessed and manipulated today.
Kristin Burnham
50%
50%
Kristin Burnham,
User Rank: Apprentice
2/12/2014 | 11:23:06 AM
Re: hacking vs robbing
Ah--the getaway driver was actually the criminal who pulled the gun in the robbery, as Rob mentions. That makes more sense now.
RobPreston
50%
50%
RobPreston,
User Rank: Apprentice
2/12/2014 | 11:12:48 AM
Re: hacking vs robbing
The criminal pulled a gun. The harsh punishment is for that, not for the amount stolen. The excessive punishment is to deter gun use in the commision of a crime...because bad things can happen whenever a criminal pulls a gun, whether he intended to use it going into the crime or not.

 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
2/12/2014 | 10:46:20 AM
Re: hacking vs robbing
I'd say it depends on the crime and or hack! In this case 25 years for driving the getaway car for a robbery of $200 (no injuries) is a little excessive!
Kristin Burnham
50%
50%
Kristin Burnham,
User Rank: Apprentice
2/12/2014 | 10:42:32 AM
Re: hacking vs robbing
Yikes, that's quite the juxtaposition. Which do you think is worse: accomplice to a physical attack or a cyber attack?
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
2/11/2014 | 4:53:08 PM
hacking vs robbing
Here's a list of computer criminals and their sentences from Wikipedia, the most recent being Lewys Martin, who was sentenced to two years imprisonment for a hacking attempt on the websites of Kent Police, Cambridge University and Oxford University in the UK. (http://en.wikipedia.org/wiki/List_of_computer_criminals)

Compare that to the 25 years Danielle Johnson got in St. Louis for driving the getaway car for a robber who pulled a gun on a local priest and stole $200, and an assortment of gift cards and bus passes. (http://www.stltoday.com/news/local/metro/man-who-helped-rob-st-louis-priest-gets-years-in/article_d1d51f01-7db2-51da-82e0-589a0936814d.html)

 
Shane M. O'Neill
50%
50%
Shane M. O'Neill,
User Rank: Apprentice
2/11/2014 | 4:11:02 PM
Re: Chump change
True, the sentence should fit the crime. Tougher to catch them slippery hackers though. 
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Strategist
2/11/2014 | 4:02:06 PM
Re: Chump change
But I'd bet the mugger would receive a lighter sentence than an apprehended hacker.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
2/11/2014 | 2:47:57 PM
Re: Chump change
Maybe a lecture from Kevin Mitnik as part of a criminal justice rehabilitation program...
Shane M. O'Neill
50%
50%
Shane M. O'Neill,
User Rank: Apprentice
2/11/2014 | 2:14:33 PM
Chump change
Stick-up man? That's amateur hour. You wanna be a thief today, you gotta have hacking skills.
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6212
Published: 2014-04-19
Unspecified vulnerability in HP Database and Middleware Automation 10.0, 10.01, 10.10, and 10.20 before 10.20.100 allows remote authenticated users to obtain sensitive information via unknown vectors.

CVE-2013-6213
Published: 2014-04-19
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 Patch 1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1833.

CVE-2013-6214
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.

CVE-2013-6215
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 10.01 and 10.10 allows remote authenticated users to execute arbitrary code via unknown vectors, aka ZDI-CAN-1977.

CVE-2013-6218
Published: 2014-04-19
Unspecified vulnerability in HP Network Node Manager i (NNMi) 9.0x, 9.1x, and 9.2x allows remote attackers to execute arbitrary code via unknown vectors.

Best of the Web