||Oracle Tips by Burleson
Chapter 5 -
All About Cybercrime
Real World Case: Website
Most people would have quit at this point, but he called
a Federal attorney and had a subpoena prepared anyway. There was
always a chance, however slim, that he would be able to find his
attacker. His lawyer also told him that they would be able to
collect damages wherever the trail ended:
The Montreal ISP – If the ISP failed to
keep proper logs of system access they would be wholly responsible
for the actions of the hacker.
The Phone Number Owner – If the owner of
the telephone number that was used to access the ISP had an open
relay wireless network, they would be responsible for the attack
because they did not lock-down their Internet gateway.
The ISP User – The owner of the User ID
and password could be held responsible for the actions used by their
This individual was not a litigious person, but
he really wanted to see what happened. To date, the Montreal ISP
has failed to comply with the U. S. court order, and he is pursuing
an “Order to Compel” from the U.S. Federal District Court. He hopes
to know who hacked into his web, but he suspects that it might take
the better part of this decade.
One must wonder if the web hackers know how
difficult it is for their victims to find them?
Next, information will be presented on other
serious cyber-crimes and will illustrate how criminals use the web
to harass, intimidate and threaten.
Download your Oracle scripts now:
definitive Oracle Script collection for every Oracle professional DBA