Wednesday, March 14, 2012

TU Tuesday - CRIME



                                                                                                                                                          

Are there laws against hacking? If so how can hacking be prevented?

In the times union article, "[Clive] Goodman arrested along with private investigator Glenn Mulcaire for suspected hacking into voicemails of royal officials.” Their punishments were said to be; “Goodman jailed for four months; Mulcaire given six-month sentence.” Laws have been made, “In the early 1980s law enforcement agencies faced the dawn of the computer
age with growing concern about the lack of criminal laws available to fight
emerging computer crimes.” As well as “Congress included in the Comprehensive Crime Control Act
of 1984 provisions to address the unauthorized access and use of computers and
computer networks.”

The penalties for computer crimes are as follows:
Table 1. Summary of CFAA Penalties

Offense Section Sentence*
Obtaining National Security Information                                                                                (a)(1) 10 (20) years
Accessing a Computer and Obtaining Information                                                             (a)(2) 1 or 5 (10)
Trespassing in a Government Computer                                                                               (a)(3) 1 (10)
Accessing a Computer to Defraud & Obtain Value                                                             (a)(4) 5 (10)
Intentionally Damaging by Knowing Transmission                                                             (a)(5)(A) 1 or 10 (20)
Recklessly Damaging by Intentional Access                                                                          (a)(5)(B) 1 or 5 (20)
Negligently Causing Damage & Loss by Intentional Access                                           (a)(5)(C) 1 (10)
Trafficking in Passwords                                                                                                                (a)(6) 1 (10)
Extortion Involving Computers                                                                                  (a)(7) 5 (10)

* The maximum prison sentences for second convictions are noted in parentheses.

The prevention of phone hacking is not attainable but there are ways of reducing your chancing of being hacked,  “Eliminating phone hacking is impossible, but you can reduce chances of ever being phone hacked by observice a few rules:
1. Prevent phone hacking through Passwords
Here are some password tips to reduce chances of being phone hacked:
1. Turn on password protection for your voice mail.
2. Never use the same password for more than one account.
3. Change your phone's default passwords.
4. Avoid passwords that are easy to guess e.g: your birth year (Can easily be found on your Facebook page).
5. Change your system passwords on a regular basis.
2. Switch off your phone
This is not the most popular option, but if you don't need to be reachable at all the times, consider this option.
3. Keep your phone updated
New phone hack prevention mechanism are released now and then as phone companies try to keep up with phone hack prevention. Its a good idea to keep your phone updated.
4. Phone security
Safeguard the physical location of your phone and related computer equipment. Consider anti-theft software like this one http://www.pctipstricks.net/hacking/free-download-anti-theft-software-mobile-phones/. With this software you can do the following:
1.Remotely lock your phone by sending sms
2.Remotely format/wipe your phone by sending sms
3.You will get the location and information of the new sim inserted in the phone.
So it can help you recover your mobile phone which has been stolen or lost accidently.
5. Turn off Bluetooth
Most phone hacking is done via bluetooth .Turn off bluetooth service when not using it.
6. Turn off voice mail service running on your provider
Some providers allow access to your voice mail without requiring a password provided that the calling number (Caller ID) is actually yours. This is usually to make their service easier to use for the intended persons. A hacker can spoof your number and call the voice mail number on your provider and operate your voice mail as though it was his own without the need to even know your password! Call your provider and either ask them to require authentication regardless of the caller ID.
Spoofing your number is easy. There are a dozen websites that offer the service at a small fee.”

No comments:

Post a Comment