Preview

Chewy 123 Case Study

Good Essays
Open Document
Open Document
371 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Chewy 123 Case Study
Think Critically: Chewy 123
Read real-world scenario to help understand and apply the theory.

FBI's most-wanted cybercriminal, Jeremy Hammond is serving one of the longest sentences a US hacker has received 10 years, the maximum allowed under his plea agreement. But to this day, he's unsure how agents cracked his Mac's encryption. Perhaps it was the fact his password was his cat's name and the numbers 123.
A hacktivist for more than a decade, Hammond, 29, was arrested in 2012 after penetrating the US-based security think tank Stratfor, whose clients include the US Department of Homeland Security and the Defense Department.
He'd been working with a subgroup of the loose-knit hacking movement "Anonymous" to disrupt the networks of Sony Pictures,

You May Also Find These Documents Helpful

  • Powerful Essays

    Charette, R. (2008, January 7). FAA To Boeing: Please Show That 787 Dreamliner Can’t Be Hacked.…

    • 1124 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    In a similar case Kerry F. Khan was a program manager for the U.S. Army Corps of Engineers that was charged with conspiracy, bribery, unlawful kickbacks, conspiracy to launder monetary instruments and criminal forfeiture. According to the U.S. Attorney Ronald C. Machen (2013), “Kerry Khan was the ringleader of the largest bribery and bid-rigging scheme in the history of federal contracting,” said U.S. Attorney Machen. “His corrupt network of public officials and private contractors looted the U.S. Treasury for years” (para. 8). For the act committed by Khan he was sentenced to 19 years in prison.…

    • 96 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Toshi, thrilled off of hacking through cyberspace, finally met his match when the RIAA hired him to work for their…

    • 605 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Better Essays

    The first human procedure was performed in 1929 by Werner Forssmann who created an incision into his left antecubital vein and then inserted a catheter into his venous system, guiding the catheter by fluoroscopy into his right atrium. The next year, he repeated the procedure into his right ventricle, later winning him the…

    • 1389 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Introduction: Below I will present an argument that that shows the computer hacking by Max Butler, the main character, demonstrated in the book Kingpin by Kevin Poulsen, was unethical in nature. Max’s actions illustrate computer crime defined as, “any incident involving an intentional act where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain and is associated with computers” (Parker, 1976). Max utilized his hacking skills in a malicious manner to victimize individuals by taking their personal property.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Canine Candies Venture has been deemed a success due to the break-even amount being reached and profit being made. As the day was slow to begin with, rain being a prominent factor at the start and the market being postponed for 2 hours, this could have contributed to not all stock being sold and the lack of people buying. This also wasn't helped by the lack of cash people had on them, most could not be bothered getting money out of the cash point which was directly outside.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Monsegur Research Papers

    • 303 Words
    • 2 Pages

    The FBI immediately put Hector X. Monsegur to work for three years to bring down the other top hackers in his group. 300 cyber-attacks were stopped and charges were given to six alleged hackers. Some of Monsegur’s crimes consisted of “three counts of conspiracy to engage in computer hacking, computer hacking in furtherance of fraud, conspiracy to commit access device fraud, conspiracy to commit bank fraud and aggravated identity theft” (Chad Bray). Most black hats should be dealt with in this manner; use their talents to catch other hackers first and then decide if he’s worthy of a pardon. He helped bring down a big threat, but that is no reason to set him loose. If the authorities hired more white and gray hats instead of jailing them and used captured black hats as a counter offense they could all prove very beneficial.…

    • 303 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    It was the 1950’s, two young men with curly blonde hair named James and Alex the had been traveling the globe looking for the best hot spots in the world for surfing. The boys had been gone for two months but are driving home from the airport now. They’d had wanted something new and exciting they’d never seen before. The beaches they visited were in Fiji, Hawaii and Brazil. They were nothing like the beaches in Australia the people were different, the waves were different and the sand was different. But was it a good different?…

    • 96 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    POLICE HISTORY

    • 470 Words
    • 2 Pages

    On August 21, 2013 Army Colonel Denise Lind, a military judge sentenced Pfc. Bradley Manning to 35 years in prison for leaking the largest cache of classified documents in U.S history. Lind also awarded Bradley with a dishonorable discharge, reduction in rank to private and all pay forfeited.…

    • 470 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Silk Road

    • 641 Words
    • 3 Pages

    Ross Ulbricht was arrested for creating the drug market “Silk Road”. Eric Marques was arrested for distributing child pornography on the Dark Net. Both of these men learned that the Dark Net is not anonymous. Ross Ulbricht and Eric Marques learned that the FBI has the power to do almost anything and if they want to find a suspect they will. The Dark Net has become more dangerous as the years go on. The Dark Net is used for a variety of illegal activities, including: hiring hitmen, purchasing and selling drugs, and viewing and uploading child pornography.…

    • 641 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “Whoever hacked into our system is bright. They didn’t leave many traces. I don’t think it was a student. This is some pretty sophisticated hacking. The police are getting closer to the hacker, though. He or she left a few bread crumbs for us to follow. Ed Robles (district technology…

    • 732 Words
    • 3 Pages
    Good Essays