Editorial Sommaire

Total Page:16

File Type:pdf, Size:1020Kb

Editorial Sommaire www.grasco.eu Parution trimestrielle www.larevuedugrasco.eu N°8— Février 2014 gratuite EDITORIAL SOMMAIRE EDITO1 Vers une directive « investigations fi- INTERVIEW : nancières » pour lutter contre le déve- EMILE PEREZ, DIRECTEUR DE LA COOPÉRATION INTER- NATIONALE4 loppement de l’économie criminelle ? . JACQUES BARROT, MEMBRE DU CONSEIL CONSTITU- TIONNEL, ANCIEN VICE-PRÉSIDENT DE LA COMMISSION EUROPÉENNE, CHARGÉ DE JUSTICE, LIBERTÉ ET SÉCU- RITÉ8 e CEIFAC accueillera, à Strasbourg, sa seconde promotion, RAPPORTS : DESSINER LE MINISTÈRE PUBLIC DE DEMAIN, À PROPOS du 17 mars au 4 avril 2013, formée de 30 représentants des DU RAPPORT NADAL, PAR MYRIAM QUÉMÉNER9 autorités de justice/police-gendarmerie/Douanes et Rensei- L CONSTATS ET PRÉCONISATIONS : gnement des Etats membres de l’Union européenne. DU RAPPORT NORA-MINC À LA LUTTE CONTRE LA CYBERCRIMINALITÉ, PAR ANNE SOUVIRA11 Créé eu sein de l’Université de Strasbourg dans le cadre d’un parte- PHÉNOMÉNOLOGIE DE LA CRIMINOLOGIE ORGANISÉE : nariat européen, le CEIFAC vise à promouvoir, au sein des Etats LES ESCROQUERIES AUX FAUX ORDRES DE VIREMENT, membres, le développement des investigations financières et de PAR PHILIPPE PETITPREZ16 FINANCE ET CRIME : PUISSANCES, HYBRIDATIONS, l’analyse financière dans le but de mieux lutter contre le dévelop- CONVERGENCES, PAR JEAN-FRANÇOIS GAYRAUD22 pement de l’infiltration de l’économie par des flux d’argent illicite. BLANCHIMENT D’ARGENT, UN NOUVEAU FLÉAU POUR Elles doivent également permettre de déjouer les fraudes finan- LES PARIS SPORTIFS, PAR CHRISTIAN KALB ET PIM VERSCHUUREN25 cières de grande envergure considérées comme étant en partie res- LA PRODUCTION ET LE TRAFIC DE CANNABIS DANS LE ponsables de la crise économique actuelle et qui menacent de dé- SUD DES BALKANS, PAR CYRILLE BAUMGARTNER31 stabiliser les systèmes financiers à l’échelle internationale. DOCTRINE SCIENCES CRIMINELLES : « HACKERS » EN DEVENIR ET EN REPENTIR, PAR DA- NIEL GUINIER36 DOCTRINE JURIDIQUE : LES INFRACTIONS NUMÉRIQUES À LA RECHERCHE D’UNE RÉGLEMENTATION 2.0, PAR AMÉLIE RODRIGUES 49 LES APPORTS DE LA LOI N° 2013-1117 DU 6 DÉCEMBRE 2013 RELATIVE À LA LUTTE CONTRE LA FRAUDE FIS- CALE ET LA GRANDE DÉLINQUANCE ÉCONOMIQUE ET FINANCIÈRE, AU DROIT DES SAISIES ET CONFISCA- TIONS, PAR CHANTAL CUTAJAR55 DU CÔTÉ DES PRATICIENS : NOTE TECHNIQUE RELATIVE À LA RÉVISION DES DÉCI- SIONS PÉNALES DÉFINITIVES, PAR CLAUDE MATHON65 LA LUTTE CONTRE LA FRAUDE DU SYSTÈME CARTES BANCAIRES CB, PAR PIERRE CHASSIGNEUX ET MARTINE BRIAT74 MANAGEMENT DE LA LUTTE ANTI-CORRUPTION ET GESTION DU RISQUE CRIMINEL, PAR PIERRE MEMHELD 83 REGARDONS AILLEURS : UNE DESCRIPTION SOMMAIRE DE LA LÉGISLATION ANTIMAFIA ITALIENNE. LES PENTITI, PAR VITO MONET- TI91 LE CADRE LÉGISLATIF ET INSTITUTIONNEL EN MATIÈRE DE LUTTE CONTRE LA CRIMINALITÉ ORGANISÉE EN ROUMANIE, PAR LAURA FELICIA CEH 95 Première promotion du CEIFAC Octobre-Novembre 2013 LE SYSTÈME ITALIEN DE LUTTE CONTRE LES PATRI- Le Groupe d'action financière (GAFI) a placé les investigations fi- MOINES MAFIEUX, PAR FABIO LICATA100 nancières au coeur de la lutte contre le blanchiment d’argent, le JURISPRUDENCE : L’AFFAIRE « PÉTROLE CONTRE NOURRITURE » DE- financement du terrorisme et la prolifération des armes de des- VANT LA JUSTICE FRANÇAISE, LIBRES PROPOS SUR truction massive dans ses recommandations révisées, adoptées en LE JUGEMENT DU TRIBUNAL CORRECTIONNEL DE PARIS DU 8 JUILLET 2013, PAR JULIETTE LELIEUR103 févier 2012. La commission européenne en a fait une priorité de la CONDITIONS REQUISES AU VISA DE L’ARTICLE 99-2 lutte contre l’infiltration de l’économie par des flux d’argent crimi- AL. 2 CPP POUR LA REMISE DES BIENS MEUBLES À L’AGRASC - A PROPOS DE CRIM. 3 DÉCEMBRE 2013, nels, phénomène en augmentation constante. PAR CHANTAL CUTAJAR109 LU POUR VOUS: L’objectif est de mettre en oeuvre des investigations financières en LA RICHESSE CACHÉE DES NATIONS – ENQUÊTE SUR même temps que l’enquête sur l’infraction qui a généré des profits. LES PARADIS FISCAUX, GÉRARD GOURGUECHON113 Il s’agit d’une enquête sur les flux financiers en lien avec les faits. Les investigations financières constructions navales internatio- financière Criminelle doivent permettre d’associer nales (DCN – I) et en blessa http://www.ceifac.eu l’expertise judiciaire et finan- douze autres dans l’explosion cière dans une approche complé- du véhicule de la marine pakis- Rapport SOCTA 2013 d’Europol : mentaire et de garantir que les tanaise à bord duquel ils se trou- Ajouter lien sur le site du GRAS- comportements infractionnels vaient, les liens entre l’attentat CO pour renvoyer au document. fassent l’objet d’une enquête et le versement de commissions En effet, ce volet financier a été exhaustive. Elles s’inscrivent à des intermédiaires pakistanais ouvert bien plus tard, lorsqu’ont dans une démarche proactive et de rétro commissions desti- été sont saisis dans les locaux favorisant l’identification et le nées à financer illicitement la de la DCN, au cours de perquisi- gel des produits de l’infraction campagne des élections prési- tions réalisées en 2008 dans le pour éviter leur dissipation, dis- dentielles françaises de 1995 cadre d’une autre information parition ou introduction dans auraient été découverts beau- judiciaire, deux rapports in- l’économie légale. coup plus tôt. ternes dénommés « Rapports Les investigations financières On se félicitera, dans cette pers- Nautilus », datés des 11 sep- sont également susceptibles de pective de la création, par les tembre et 7 novembre 2002 qui révéler l’existence d’infractions lois du 6 décembre 2013, du avaient été commandés par la qui n’auraient jamais été décou- Procureur de la République fi- société DCN-1 à un ancien agent vertes sans elles. Ainsi, en nancier, qui devrait, s’il est doté de la DST dans le but de recher- France, l’opération baptisée des moyens nécessaires, contri- cher notamment sur qui pouvait « Virus » a permis en octobre buer à la systématisation de ces rejaillir la responsabilité de l’at- 2012, à l’Office Central de la Ré- investigations en matière de cor- tentat du 8 mai 2002. V. Cutajar pression de la Grande Délin- ruption et de fraude fiscale C., Affaire Karachi : une nouvelle quance Financière et l’Office grave. consécration du droit à la vérité, Central de Répression du Trafic JCP, éd. G, n° 23, 674 à propos A l’échelle de l’Union euro- Illicite de Stupéfiants, agissant de Cass. crim., 4 avr. 2012, n° 11 péenne plusieurs textes recom- de concert, de démanteler un -81.124. mandent la mise en oeuvre important réseau franco-suisse- d’investigations financières pour Communication de la Commis- marocain d’importation de has- lutter contre la corruption, la sion au Parlement européen, au chich et de blanchiment dans traite des êtres humains, le blan- Conseil, au Comité économique lequel apparaissaient aux côtés chiment. Ainsi, la Commission et social européen et au Comité de trafiquants de drogue de ban- préconise que les Etats membres des Régions – La stratégie de lieue et de financiers véreux, des mènent activement, à partir de l’UE en vue de l’éradication de la notables : un avocat, un den- 2013, des investigations finan- traite des êtres humains pour la tiste, un marchand d’art, un in- cières dans les affaires de traites période 2012-2016 COM(2012) génieur du son, un entrepre- des êtres humains. Il leur est 286 final. neur, un patron d’une entreprise demandé de fournir des infor- et même une élue locale. Tous mations à Europol aux fins détenaient un compte en suisse d’analyse et de traitement et de et souhaitaient récupérer l’ar- 1. Collège Européen des Investigations Finan- renforcer leur coopération avec cières et de l’Analyse financière Criminelle gent en liquide pour frauder le 2. http://www.ceifac.eu EUROJUST et CEPOL. Europol fisc sans prendre le risque d’al- 3. Rapport SOCTA 2013 d’Europol : http:// procèdera d’ici 2015 à une ana- grasco.u-strasbg.fr/public/document/ ler en Suisse pour le retirer. Ils europol_socta_2013-Report.pdf lyse des informations trans- ont été mis en examen pour 4. En effet, ce volet financier a été ouvert mises par les Etats membres sur bien plus tard, lorsqu’ont été sont saisis blanchiment de fraude fiscale. dans les locaux de la DCN, au cours de les investigations financières Les investigations financières perquisitions réalisées en 2008 dans le dans ces affaires. Cette analyse cadre d’une autre information judiciaire, ont ainsi mis en lumière la poro- deux rapports internes dénommés devrait permettre de dégager les « Rapports Nautilus », datés des 11 sep- sité entre le monde des organi- bonnes pratiques ainsi que des tembre et 7 novembre 2002 qui avaient été sations criminelles et celui des commandés par la société DCN-1 à un an- modèles pour les enquêtes poli- cien agent de la DST dans le but de recher- individus parfaitement insérés cières financières. cher notamment sur qui pouvait rejaillir la socialement. responsabilité de l’attentat du 8 mai 2002. V. Cutajar C., Affaire Karachi : une nouvelle Peut-être le premier pas vers ce Si, de telles investigations consécration du droit à la vérité, JCP, éd. G, qui pourrait préfigurer dans n° 23, 674 à propos de Cass. crim., 4 avr. avaient été déclenchées, dès le 2012, n° 11-81.124. l’avenir, une directive départ, lors de l’attentat de Ka- 5. Communication de la Commission au Parle- « Investigations financières »… ment européen, au Conseil, au Comité rachi, qui le 8 mai 2002 provo- économique et social européen et au Comi- té des Régions – La stratégie de l’UE en vue qua la mort de onze employés Collège Européen des Investiga- de l’éradication de la traite des êtres hu- français de la Direction des tions Financières et de l’Analyse mains pour la période 2012-2016 COM (2012)286 final. 2 N° 8– Janvier 2014 COMITÉ SCIENTIFIQUE DU GRASCO Jean Pradel : Jean PRADEL né en 1933 fut successivement magistrat (de 1959 à 1969), puis professeur agrégé en 1969.
Recommended publications
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace
    TANGLED WEB Tales of Digital Crime from the Shadows of Cyberspace RICHARD POWER A Division of Macmillan USA 201 West 103rd Street, Indianapolis, Indiana 46290 Tangled Web: Tales of Digital Crime Associate Publisher from the Shadows of Cyberspace Tracy Dunkelberger Copyright 2000 by Que Corporation Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a Kathryn Purdum retrieval system, or transmitted by any means, electronic, mechanical, pho- Development Editor tocopying, recording, or otherwise, without written permission from the Hugh Vandivier publisher. No patent liability is assumed with respect to the use of the infor- mation contained herein. Although every precaution has been taken in the Managing Editor preparation of this book, the publisher and author assume no responsibility Thomas Hayes for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor International Standard Book Number: 0-7897-2443-x Tonya Simpson Library of Congress Catalog Card Number: 00-106209 Copy Editor Printed in the United States of America Michael Dietsch First Printing: September 2000 Indexer 02 01 00 4 3 2 Erika Millen Trademarks Proofreader Benjamin Berg All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Que Corporation cannot Team Coordinator attest to the accuracy of this information. Use of a term in this book should Vicki Harding not be regarded as affecting the validity of any trademark or service mark. Design Manager Warning and Disclaimer Sandra Schroeder Every effort has been made to make this book as complete and as accurate Cover Designer as possible, but no warranty or fitness is implied.
    [Show full text]
  • Introduction
    Introduction Toward a Radical Criminology of Hackers In the expansive Rio Hotel and Casino in Las Vegas, I stood in line for around an hour and a half to pay for my badge for admittance into DEF CON 21, one of the largest hacker conventions in the world. The wad of cash in my hand felt heavier than it should have as I approached the badge vendor. DEF CON is an extravagant affair and attendees pay for it (though, from my own readings, the conference administrators work to keep the costs reduced). The line slowly trickled down the ramp into the hotel con- vention area where the badge booths were arranged. As I laid eyes on the convention, my jaw dropped. It was packed. Attendees were already mov- ing hurriedly throughout the place, engaged in energetic conversations. Black t- shirts— a kind of hacker uniform— were everywhere. Las Vegas- and gambling- themed décor lined the walls and floors. Already, I could see a line forming at the DEF CON merchandise booth. Miles, a hacker I had gotten to know throughout my research, mentioned that if I wanted some of the “swag” or “loot” (the conference merchandise), I should go ahead and get in line, a potential three- to four-hour wait. Seemingly, everyone wanted to purchase merchandise to provide some evidence they were in attendance. Wait too long and the loot runs out. After winding through the serpentine line of conference attendees wait- ing for admittance, I approached the badge vendors and (dearly) departed with almost $200. Stepping into the convention area, I felt that loss in the pit of my stomach.
    [Show full text]
  • What Are Kernel-Mode Rootkits?
    www.it-ebooks.info Hacking Exposed™ Malware & Rootkits Reviews “Accessible but not dumbed-down, this latest addition to the Hacking Exposed series is a stellar example of why this series remains one of the best-selling security franchises out there. System administrators and Average Joe computer users alike need to come to grips with the sophistication and stealth of modern malware, and this book calmly and clearly explains the threat.” —Brian Krebs, Reporter for The Washington Post and author of the Security Fix Blog “A harrowing guide to where the bad guys hide, and how you can find them.” —Dan Kaminsky, Director of Penetration Testing, IOActive, Inc. “The authors tackle malware, a deep and diverse issue in computer security, with common terms and relevant examples. Malware is a cold deadly tool in hacking; the authors address it openly, showing its capabilities with direct technical insight. The result is a good read that moves quickly, filling in the gaps even for the knowledgeable reader.” —Christopher Jordan, VP, Threat Intelligence, McAfee; Principal Investigator to DHS Botnet Research “Remember the end-of-semester review sessions where the instructor would go over everything from the whole term in just enough detail so you would understand all the key points, but also leave you with enough references to dig deeper where you wanted? Hacking Exposed Malware & Rootkits resembles this! A top-notch reference for novices and security professionals alike, this book provides just enough detail to explain the topics being presented, but not too much to dissuade those new to security.” —LTC Ron Dodge, U.S.
    [Show full text]
  • Infosec Year in Review -- 1999
    InfoSec Year In Review -- 1999 M. E. Kabay, PhD, CISSP. Security Leader, INFOSEC Group, AtomicTangerine Inc. Category 11 Breaches of confidentiality Date 1999-01-29 Keyword data leakage privacy confidentiality control Web Source, Vol, No. RISKS 20 18 The Canadian consumer-tracking service Air Miles inadvertently left 50,000 records of applicants for its loyalty program publicly accessible on their Web site for an undetermined length of time. The Web site was offline as of 21 January until the problem was fixed. Date 1999-02-03 Keyword data leakage Web script QA vulnerability confidentiality Source, Vol, No. WIRED via PointCast An error in the configuration or programming of the F. A. O. Schwarz Web site resulted paradoxically in weakening the security of transactions deliberately completed by FAX instead of through SSL. Customers who declined to send their credit-card numbers via SSL ended up having their personal details — address and so forth — stored in a Web page that could be accessed by anyone entering a URL with an appropriate (even if randomly chosen) numerical component. Date 1999-02-10 Keyword e-commerce credit card personal information password privacy Source, Vol, No. RISKS 20 20 Prof. Ross Anderson of Cambridge University analyzed requirements on the AMAZON.COM online bookstore for credit card number, password, and personal details such as phone number. He identified several risks: (1) merchant retention of credit card numbers poses a far higher risk of capture than of capture in transit; (2) adding a password increases the likelihood of compromise because so many naïve users choose bad passwords and then write them down; (3) even the British site for Amazon contravenes European rules on protecting consumer privacy; (3) such practices make it easier for banks to reject their clients' claims of fraudulent use of their credit-card numbers.
    [Show full text]
  • Index Images Download 2006 News Crack Serial Warez Full 12 Contact
    index images download 2006 news crack serial warez full 12 contact about search spacer privacy 11 logo blog new 10 cgi-bin faq rss home img default 2005 products sitemap archives 1 09 links 01 08 06 2 07 login articles support 05 keygen article 04 03 help events archive 02 register en forum software downloads 3 security 13 category 4 content 14 main 15 press media templates services icons resources info profile 16 2004 18 docs contactus files features html 20 21 5 22 page 6 misc 19 partners 24 terms 2007 23 17 i 27 top 26 9 legal 30 banners xml 29 28 7 tools projects 25 0 user feed themes linux forums jobs business 8 video email books banner reviews view graphics research feedback pdf print ads modules 2003 company blank pub games copyright common site comments people aboutus product sports logos buttons english story image uploads 31 subscribe blogs atom gallery newsletter stats careers music pages publications technology calendar stories photos papers community data history arrow submit www s web library wiki header education go internet b in advertise spam a nav mail users Images members topics disclaimer store clear feeds c awards 2002 Default general pics dir signup solutions map News public doc de weblog index2 shop contacts fr homepage travel button pixel list viewtopic documents overview tips adclick contact_us movies wp-content catalog us p staff hardware wireless global screenshots apps online version directory mobile other advertising tech welcome admin t policy faqs link 2001 training releases space member static join health
    [Show full text]
  • The European Inter-University Association on Society, Science and DEVELOPING MALWARE
    ESST The European Inter-University Association on Society, Science and Technology DEVELOPING MALWARE - A SCOT ANALYSIS OF THE SUCCESS OF MALWARE Globalization, Innovation and Policy Erlend Flesjø First Semester University: University of Oslo Second Semester University: University of Oslo Word count: 21.309 2 2 3 Abstract Computer malware has drastically increased over the last 20 years and it shows no sign of slowing down. On the contrary, malware spreads like ever before causing more critical situations as well as threatening the entire online economy in the process. Despite of the critical threat malware represents governments and the anti-virus communities have not yet managed to get the upper hand in the fight against malware and their creators. This thesis analyzes the development of malware using the theory and methodology of Social Construction of Technology set forward by Bijker and Pinch. My empirical data is from relevant companies and organizations around Oslo and has been gathered from interviews. (Watchcom Security Group, Symantec Norway, international hackers and The National Criminal Investigation Service) My thesis traces the development of computer malware, looking at factors that have influenced the process and the power play between relevant social groups who wants to shape the development. It also highlights social and structural reasons why the government and the anti-virus industry have failed to contain malware. Keywords: SCOT, STS, malware, computer virus, botnet 3 4 4 5 Acknowledgements: I would like to thank the following persons for their help while writing this thesis. First and foremost, my supervisor Post. Doc. Beate Elvebakk, for her constructive feedback, good ideas and general helpful suggestions.
    [Show full text]
  • IYIR for HTML
    INFOSEC Year in Review 1997 M. E. Kabay, PhD, CISSP Assoc. Prof. Information Assurance Dept. of Computer Information Systems, Division of Business Norwich University [email protected] Copyright © 2003 M. E. Kabay. All rights reserved. Page 1 INFOSEC Year in Review 1997 11 Breaches of confidentiality Category 11 Breaches of confidentiality 1997-02-23 medical data confidentiality PA News In Sheffield, England, a hospital handed over 50,000 confidential gynecological records to a data processing firm that hired people off the street and set them to work transcribing the unprotected data. The scandal resulted in withdrawal of the contract, but thousands of records were exposed to a wide variety of people with no background checking to ascertain their reliability. Category 11 Breaches of confidentiality 1997-04-08 QA operations security confidentiality AP, Reuters The General Accounting Office lambasted the IRS for improper operations security, saying that the IRS "misplaced" 6,000 computer tapes and cartridges. Sen. John Glenn (D-OH), who released the report, also introduced a bill to define criminal penalties against IRS employees who snoop into taxpayer records without cause. Glenn said that out of 1,515 cases of unauthorized browsing identified in the 1994 and 1995 fiscal years at the IRS, only 23 employees were fired for the activity. Category 11 Breaches of confidentiality 1997-04-30 medical confidentiality AIDS database UPI Greg Wentz was found guilty of anonymously mailing a list of 4,000 names of people with AIDS to two Florida newspapers. It turned out that he was acting vindictively to punish his ex-lover, William Calvert III.
    [Show full text]
  • Cyber-Crimes: a Practical Approach to the Application of Federal Computer Crime Laws Eric J
    Santa Clara High Technology Law Journal Volume 16 | Issue 2 Article 1 January 2000 Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws Eric J. Sinrod William P. Reilly Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Eric J. Sinrod and William P. Reilly, Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws, 16 Santa Clara High Tech. L.J. 177 (2000). Available at: http://digitalcommons.law.scu.edu/chtlj/vol16/iss2/1 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. ARTICLES CYBER-CRIMES: A PRACTICAL APPROACH TO THE APPLICATION OF FEDERAL COMPUTER CRIME LAWS Eric J. Sinrod' and William P. Reilly" TABLE OF CONTENTS I. Introduction ................................................................................178 II. Background ................................................................................ 180 A. The State of the Law ................................................................... 180 B. The Perpetrators-Hackers and Crackers ..................................... 181 1. H ackers ................................................................................... 181 2. Crackers .................................................................................
    [Show full text]
  • State of the Practice of Intrusion Detection Technologies
    State of the Practice of Intrusion Detection Technologies Julia Allen Alan Christie William Fithen John McHugh Jed Pickel Ed Stoner Contributors: James Ellis Eric Hayes Jerome Marella Bradford Willke January 2000 Networked Systems Survivability Program TECHNICAL REPORT CMU/SEI-99-TR-028 ESC-99-028 Pittsburgh, PA 15213-3890 State of the Practice of Intrusion Detection Technologies CMU/SEI-99-TR-028 ESC-99-028 Authors: Julia Allen Alan Christie William Fithen John McHugh Jed Pickel Ed Stoner Contributors: James Ellis Eric Hayes Jerome Marella Bradford Willke January 2000 Networked Systems Survivability Program Unlimited distribution subject to the copyright. This work is sponsored by the Air Force Research Laboratory and the Air Force Computer Resources Support Improvement Program. The Software Engineering Institute is a federally funded research and development center sponsored by the U.S. Department of Defense. Copyright © 2000 by Carnegie Mellon University. Please see http://www.sei.cmu.edu/publications/pubweb.html for information about how to order paper copies of SEI reports. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. This work was created in the performance of Federal Government Contract Number F19628-95-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center.
    [Show full text]
  • An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p. ii ABSTRACT This dissertation examines both the subculture and social organization practices of computer hackers. The concept of normative orders (Herbert, 1998: 347) is used to explore hacker subculture in different contexts.
    [Show full text]
  • Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack
    Media History Monographs 11:2 (2008-2009) ISSN 1940-8862 Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack Brett Lunceford University of South Alabama Research concerning computer hackers generally focuses on how to stop them; far less attention is given to the texts they create. Phrack, an online hacker journal that has run almost continuously since 1985, is an important touchstone in hacker literature, widely read by both hackers and telephone and network security professionals. But beyond its instantiation as a compendium of illicit technical knowledge, Phrack was, above all, a rhetorical publication. The files in each issue of Phrack created a shared rhetorical vision concerning the place of the hacker underground within society and in relation to law enforcement officials, as well as what it means to be a hacker. This essay examines two important events in the evolution of the hacker movement through the lens of Phrack—Operation Sundevil and the arrest of Kevin Mitnick. How these events were framed in Phrack both shaped and reflected emerging shifts in hacker collective identity. ©2009 Brett Lunceford Media History Monographs 11:2 Lunceford: Reading Phrack Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack Stephen Segaller describes the formation of Managers that Helps Protect Corporate Data the Internet as “one of the twentieth century’s from Assaults by the Hackers” and “The most productive accidents,” explaining that the World of Data Confronts the Joy of Hacking,” “seeds of the Internet were planted by the U.S. which begins, “The recent electronic government in the wake of nationwide concern escapades of a group of Milwaukee youths over the Soviet launch of Sputnik.”44 Hackers have brought national attention to the growing were an integral part of the construction of this problem of computer security,”47 demonstrate network.
    [Show full text]