HOME
*





David J. Hickton
David J. Hickton (born August 14, 1955) is the director and founder of the University of Pittsburgh Institute for Cyber Law, Policy and Security. Prior to that, he was the 57th U.S. Attorney for the Western District of Pennsylvania. He resigned following the election of President Donald Trump and began his position at Pitt in January 2017. While a U.S. Attorney, Hickton brought several indictments for cybertheft and hacking. Prior to becoming U.S. Attorney, Hickton engaged in the private practice of law, specifically in the areas of transportation, litigation, commercial and white collar crime. Early life and education Hickton was born on August 14, 1955, in Columbus, Ohio. He received his undergraduate degree from Pennsylvania State University and his Juris Doctor degree from the University of Pittsburgh School of Law, where he met his wife Dawne Eileen Sepanski Hickton. Career Hickton began his legal career as a law clerk for U.S. District Judge Gustave Diamond from 1981 ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

United States Attorney
United States attorneys are officials of the U.S. Department of Justice who serve as the chief federal law enforcement officers in each of the 94 U.S. federal judicial districts. Each U.S. attorney serves as the United States' chief federal criminal prosecutor in their judicial district and represents the U.S. federal government in civil litigation in federal and state court within their geographic jurisdiction. U.S. attorneys must be nominated by the President and confirmed by the Senate, after which they serve four-year terms. Currently, there are 93 U.S. attorneys in 94 district offices located throughout the United States, Puerto Rico, the U.S. Virgin Islands, Guam, and the Northern Mariana Islands. One U.S. attorney is assigned to each of the judicial districts, with the exception of Guam and the Northern Mariana Islands, where a single U.S. attorney serves both districts. Each U.S. attorney is the chief federal law enforcement officer within a specified jurisdiction, a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Competition Law
Competition law is the field of law that promotes or seeks to maintain market competition by regulating anti-competitive conduct by companies. Competition law is implemented through public and private enforcement. It is also known as antitrust law (or just antitrust), anti-monopoly law, and trade practices law. The history of competition law reaches back to the Roman Empire. The business practices of market traders, guilds and governments have always been subject to scrutiny, and sometimes severe sanctions. Since the 20th century, competition law has become global. The two largest and most influential systems of competition regulation are United States antitrust law and European Union competition law. National and regional competition authorities across the world have formed international support and enforcement networks. Modern competition law has historically evolved on a national level to promote and maintain fair competition in markets principally within the territorial boun ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Social Security Number
In the United States, a Social Security number (SSN) is a nine-digit number issued to U.S. citizens, permanent residents, and temporary (working) residents under section 205(c)(2) of the Social Security Act, codified as . The number is issued to an individual by the Social Security Administration, an independent agency of the United States government. Although the original purpose for the number was for the Social Security Administration to track individuals, the Social Security number has become a ''de facto'' national identification number for taxation and other purposes. A Social Security number may be obtained by applying on Form SS-5, Application for a Social Security Number Card. History Social Security numbers were first issued by the Social Security Administration in November 1936 as part of the New Deal Social Security program. Within three months, 25 million numbers were issued. On November 24, 1936, 1,074 of the nation's 45,000 post offices were designated "typing ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Malware
Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. By contrast, software that causes harm due to some deficiency is typically described as a software bug. Malware poses serious problems to individuals and businesses on the Internet. According to Symantec's 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016. Cybercrime, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy $6 trillion USD in 2021, and is increasing at a rate of 15% per year. Many types of malware exist, including computer viruses, worms, Trojan horses, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Security Hacker
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the "computer underground". Longstanding controversy surrounds the meaning of the term "hacker." In this controversy, computer programmers reclaim the term ''hacker'', arguing that it refers simply to someone with an advanced understanding of computers and computer networks and that ''cracker'' is the more appropriate term for those who break into computers, whether computer criminals ( black hats) or computer security experts ( white hats). A 2014 article noted that "the black-hat meaning still prevails among the general public". History Birth of subcult ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Black Market
A black market, underground economy, or shadow economy is a clandestine market or series of transactions that has some aspect of illegality or is characterized by noncompliance with an institutional set of rules. If the rule defines the set of goods and services whose production and distribution is prohibited by law, non-compliance with the rule constitutes a black market trade since the transaction itself is illegal. Parties engaging in the production or distribution of prohibited goods and services are members of the . Examples include the illegal drug trade, prostitution (where prohibited), illegal currency transactions, and human trafficking. Violations of the tax code involving income tax evasion in the . Because tax evasion or participation in a black market activity is illegal, participants attempt to hide their behavior from the government or regulatory authority. Cash is the preferred medium of exchange in illegal transactions since cash transactions are less-easi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Crime Forum
A crime forum is a generic term for an Internet forum specialising in computer crime and Internet fraud activities such as Hacker (computer security), hacking, Online Identity Theft, Phishing, Pharming, Malware Attacks or spamming. During the early days of the Internet public Bulletin board system, dial up BBSes would serve to put miscreants in touch with one another to share tips of credit card fraud, Hacker (computer security), hacking and other illicit services. By the 2000s and the rise of the web, modern Internet forum software was preferred, with private invite-only sites being the most long lived. Sites like ShadowCrew, counterfeitlibrary.com and the Russian language carderplanet.com would specialise in various illegal activities before each eventually succumbing to law enforcement action. By 2015 notorious forums such as Darkode would be infiltrated and dismantled prior to returning with increased security. As of July 2015 there are estimated to be several hundred such fo ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Crime
A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing the crime, or it may be the target. Cybercrime may harm someone's security or finances. There are many privacy concerns surrounding cybercrime when confidential information is intercepted or disclosed, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Cybercrimes crossing international borders and involving the actions of at least one nation-state are sometimes referred to as cyberwarfare. Warren Buffett describes cybercrime as the "number one problem with mankind" and said that cybercrime "poses real risks to humanity." A 2014 report sponsored by McAfee estimated that cybercrime resulted in $445 billion in annual dama ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Dark0de
dark0de, also known as Darkode, is a cybercrime forum and black marketplace described by Europol as "the most prolific English-speaking cybercriminal forum to date". This site which was launched in 2007, serves as a venue for the sale and trade of hacking services, botnets, malware, stolen personally identifiable information, credit card information, hacked server credentials, and other illicit goods and services. History In early 2013, it came under a large DDoS attack moving from bulletproof hosting provider Santrex to Off-shore, the latter being a participant of the Stophaus campaign against Spamhaus. The site has had an ongoing feud with security researcher Brian Krebs. In April 2014, various site users were attacked via the Heartbleed exploit, gaining access to private areas of the site. Take down The forum was the target of Operation Shrouded Horizon, an international law enforcement effort led by the Federal Bureau of Investigation which culminated in the site' ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Federal Bureau Of Investigation
The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, the FBI is also a member of the U.S. Intelligence Community and reports to both the Attorney General and the Director of National Intelligence. A leading U.S. counterterrorism, counterintelligence, and criminal investigative organization, the FBI has jurisdiction over violations of more than 200 categories of federal crimes. Although many of the FBI's functions are unique, its activities in support of national security are comparable to those of the British MI5 and NCA; the New Zealand GCSB and the Russian FSB. Unlike the Central Intelligence Agency (CIA), which has no law enforcement authority and is focused on intelligence collection abroad, the FBI is primarily a domestic agency, maintaining 56 field offices in major cities throug ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Evgeniy Bogachev
GameOverZeus is a peer-to-peer botnet based on components from the earlier ZeuS trojan. The malware was created by Russian hacker Evgeniy Mikhailovich Bogachev. It is believed to have been spread through use of the Cutwail botnet. Unlike its predecessor the ZeuS trojan, Gameover ZeuS uses an encrypted peer-to-peer communication system to communicate between its nodes and its command and control servers, greatly reducing its vulnerability to law enforcement operations. The algorithm used appears to be modeled on the Kademlia P2P protocol. Scammers control and monitor Gameover ZeuS via command and control (C&C) servers. The virus establishes the connection to the server as soon as its malicious executable installs on the computer, at which point it can disable certain system processes, download and launch executables, or delete essential system files, making the system unusable. According to a report by Symantec, Gameover ZeuS has largely been used for banking fraud and distri ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Allegheny Technologies
ATI Inc. (previously Allegheny Technologies Incorporated) is an American producer of specialty materials, the company is headquartered in Dallas, Texas. ATI produces titanium and titanium alloys, nickel-based alloys and superalloys, grain-oriented electrical steel, stainless and specialty steels, zirconium, hafnium, and niobium, tungsten materials, forgings and castings. ATI's key markets are aerospace and defense particularly commercial jet engines (over 50% of sales), oil & gas, chemical process industry, electrical energy, and medical. The company's plants in Western Pennsylvania include facilities in Harrison Township (Allegheny Ludlum's Brackenridge Works), Vandergrift, and Washington. The company also has plants in: Illinois; Indiana; Ohio; Kentucky; California; South Carolina; Oregon; Alabama; Texas; Connecticut; Massachusetts; North Carolina; Wisconsin; New York; Shanghai, China; and several facilities in Europe. Its titanium sponge plants are located in Albany, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]