Journal Entry # 5

Review the articles linked with each individual motive in slide/page #3.  Rank the motives from 1 to 8 as the motives that you think make the most sense (being 1) to the least sense (being 8).  Explain why you rank each motive the way you rank it.

Upon reviewing the article links for each individual motive, I couldn’t honestly say any of them made any sense to me. I started with (1) Multiple reasons link, I found it was very insightful and touched on many of the other reasons. The ending caught my attention the most. The author’s quote about “cyber criminals being too young or too insecure to work a system that feels like it’s set up to watch them fail” (Zurkus 2018). This can be said about many criminals being insecure and making up all types of excuses to commit crimes. (2) I found the recognition link a good motive, as the hacker would have to find out or intentionally disclose their acts for praise. (3) Curiosity is my next link as the skill that it would take for you to be motivated enough to hack into NASA, after removing Windows from your PC and installing Linux because they wanted to see how it worked. (4) Entertainment link was also interesting, although it seemed more like the scraping of LinkedIn was committed for money and recognition. (5) The link referencing the motivation of Money makes sense, creating the dream of every day you are living like a celebrity in Las Vegas or somewhere glamourous. The cyber offender is paying for companionship and how long does it last. (6) Political link is under the guise of hacktivism, but it really seems like young adults throwing tantrums as they don’t get their way. (7) Revenge may have upset some so bad that they wanted them to feel what they felt and that is why they would do something to this degree. (8) Boredom children talking to others online because they have no choice due to the pandemic is understandable. Unfortunately, parents aren’t using this time to reacquaint themselves with children, but no excuse for the online predator’s motivation.

  1. https://www.infosecurity-magazine.com/news/what-drives-hackers-to-a-life-of/?__cf_chl_jschl_tk__=pmd_c1d89a4695edbd23f2bceb54d70f35ce5e536e86-1626721164-0-gqNtZGzNAfijcnBszQi6
  2. https://timesofindia.indiatimes.com/etimes/trending/nasa-appreciates-hacker-who-claims-to-have-breached-their-systems/articleshow/113787089.cms
  3. https://medium.com/@sudra_shyam/story-of-a-15-year-old-who-hacked-nasa-out-of-curiosity-a35ac2ff0d63
  4. https://9to5mac.com/2021/07/19/man-behind-linkedin-scraping/
  5. https://threatresearch.ext.hp.com/sex-drugs-and-toilet-rolls-how-cybercriminals-spend-their-money-infographic/
  6. https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents
  7. https://newsfromwales.co.uk/news/revenge-porn-victims-in-wales-often-feel-let-down-by-the-law-as-cybercrime-slips-through-the-net/
  8. https://www.heraldlive.co.za/news/2021-05-31-cyberbullying-and-online-sexual-grooming-of-children-on-the-increase/