Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Professional Ethics

Professional Ethics

Ratings: (0)|Views: 206|Likes:
Published by Paul John

More info:

Published by: Paul John on Dec 06, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less

12/05/2009

pdf

text

original

 
Paul John F. CadagProfessional EthicsMWF(1:00 2:00)Legion of Doom (LOD)1.What was the case about?
As a hacker group that active from the 1980s to the late 1990s and early 2000. Their name appears to be a reference to the antagonists of Challenge of the Superfriends. LOD wasfounded by the hacker Lex Luthor, after a rift with his previous group the Knights of Shadow(much as the Masters of Deception would later be founded after Phiber Optik had a rift withChris Goggans and LOD, eventually leading to the Great Hacker War and disbanding of bothgroups).
2.Who were the protagonists & parties involved?
LOD was split into LOD and LOD/LOH (Legion of Doom/Legion of Hackers) for themembers that were more skilled at hacking than pure phone phreaking.
3.Did any prosecutions result?
YES!!, because Unlike Masters of Deception there were different opinions regarding what theLegion of Doom was. LOD published the Legion of Doom Technical Journals and regularlycontributed to the overall pool of hacking knowledge and information, while causing no directharm to the phone systems and computer networks they took over. On the other hand, manyLOD members were raided, charged and in some cases successfully prosecuted for causingdamage to systems and reprogramming phone company computers (Grant, Darden and Riggs,etc). While the "Bellsouth" case could be construed as exploration of the phone system, withclaims that no real damage was done, there are other former LOD members such as Corey A.Lindsly, who were clearly interested in for-profit computer crime, with no goal except personalgain.
4.If so, what were their outcomes?
Although the overall expressed beliefs and behavior of LOD and MOD were different, itcan be difficult to untangle the individual actions of any given member. In many cases thereseems to be cross-over between the two groups or collaboration between LOD and MODmembers, even in the midst of The Great Hacker War.
5.What ethical issues are raised by this case?
The ethical issues in this case is if you an hacker or member of some kind of hacker group. Youcannot deny that you are the hacker. And you cannot avoid the war between the two groups of hacker.
Masters of Deception (MOD)
 
1.What was the case about?
Was a New York-based hacker group. MOD reportedly controlled all the major telephoneRBOC's and X.25 networks as well as controlling large parts of the backbone of the rapidlyemerging Internet.
2.Who were the protagonists & parties involved?
MOD's initial membership grew from meetings on Loop-Around Test Lines that led tolegendary collaborations to hack RBOC phone switches and the various minicomputers andmainframes used to administer the telephone network. They successfully remained undergroundusing alternative handles to hide even their true hacker identities.
3.Did any prosecutions result?
According to Lex Luthor, "I realized early on that only certain people can be trusted with certaininformation, and certain types of information can be trusted to no one. Giving out useful thingsto irresponsible people would inevitably lead to whatever thing it was being abused and nolonger useful.
4.If so, what were their outcomes?
As a result of a major nationwide investigation by a joint FBI/Secret Service task forcecalled Operation Sundevil[1], five of MOD's members were indicted in 1992 in federal court.Within the next six months (in 1993), all five pleaded guilty and were sentenced to either  probation or prison.
5.What ethical issues are raised by this case?
The ethical issues in this case is if you an hacker or member of some kind of hacker group. Youcannot deny that you are the hacker. And you cannot avoid the war between the two groups of hacker.
 

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->