Phreaking {Ans: attacking phone systems to obtain free phone line access, use phone lines to transmit malware, and to access, steal, and destroy data}Hacktivism {Ans: Use of hacking to promote an activist agenda}blaster.exe {Ans: Spread by exploiting buffer overflow, DDoS windowsupdate.com}Specific Deterrence Theory {Ans: its happened, warned, won't do it again}Hacker Subculture {Ans: provides deviant subculture that facilitates computer use for criminal activities. Technology, knowledge, and secrecy necessary}General Deterrence Theory {Ans: We keep people from doing bad things by providing rules}How has technology influenced crime and society {Ans: -Lessons social interaction -Lowers inhibitions -Decreased boundaries -Increased anonymity}Intellectual Property & Protection {Ans: }2003 Blackout {Ans: Caused by a software bug in the alarm system at the control room of FirstEnergy, which rendered operators unaware of the need to redistribute load after overloaded transmission lines drooped into foliage}5 Categories of Insiders {Ans: Current staff, former staff, departing staff, service providers, partners}Hacker Tools of the Trade {Ans: }History of Digital Piracy {Ans: }Shaw (1998) {Ans: }Operation Payback {Ans: DDoS attacks by Anonymous on websites of banks who had withdrawn banking facilities from WikiLeaks. Anonymous users attacked those companies, starting