O'Reilly Media is one of the premier technology publishing companies, who like all serious publishing houses have strong policies and guidelines regarding plagiarism. They also have a Missing Manuals series of books. The goal of the Missing Manual series, is to “produce sterling, beautifully written manuals for popular consumer software and hardware products”
So with license, perhaps this post should be titled How To Become The World’s No. 1 Hacker – The Missing Bibliography.
In my initial review of How To Become The Worlds No. 1 Hacker, I noted that the author plagiarized most of his sources.
Of the books 26 chapters, I used iThenticate plagiarism checker from iParadigms to check the 13 largest chapters. Many of the smaller chapters were 1-2 pages in length, and were not analyzed.
The following iThenticate screen shot speaks for itself. The report field is an overall similarity index for each submission. This index determines the percentage of similarity between a submission and information existing in the iThenticate databases selected as search targets.
So how much can an author legitimately copy under the fair use doctrine? As to the notion of fair use, the U.S. Copyright Officenotes that the doctrine of fair use has developed through a substantial number of court decisions over the years and has been codified in section 107 of the copyright law.
Section 107 contains a list of the various purposes for which the reproduction of a particular work may be considered fair, such as criticism, comment, news reporting, teaching, scholarship, and research. Section 107 also sets out four factors to be considered in determining whether or not a particular use is fair, namely the:
1. purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes
2. nature of the copyrighted work
3. amount and substantiality of the portion used in relation to the copyrighted work as a whole
4. effect of the use upon the potential market for, or value of, the copyrighted work
The distinction between fair use and infringement is not easily defined, and in fact, seems to almost defy definition. There is no specific number of words, lines, or notes that may safely be taken without permission. Anytime a specific number or percentage is used, that refers to general guidelines, not the copyright law.
But even before the plagiarized text begins in the book, there is misrepresentation of the truth. The following is a screen shot from page 24:
The author states that LIGATT is the official cyber security provider for the Phillps Arena, Atlanta Hawks basketball team, andAtlanta Thrashers hockey team. The firm also noted this in a October 2009 press release, which was then picked up as a news story by the Atlanta Business Chronicle and Sports Business Journal.
But no such deal ever took place. Tracy White, Chief Sales Officer and Senior VP of Sales and Marketing for Atlanta Spirit LLC, the parent company of the Atlanta Thrashers, stated that “LIGATT doesn’t provide (nor have they ever provided) services for the Hawks, Thrashers or Philips Arena.”
With that, the following are the sources copied in the book:
Chapter 2
Chapter 4
Number of words | Source |
3219 (plus screen shots) | http://www.ibm.com/developerworks/library/s-crack/ |
2867 | http://host14.ipowerweb.com/~hackerth/org/texts/hacking/howtobrute.php |
1302 | http://starbase.airweb.net/tech/hack-faq.html |
892 | http://sectools.org/crackers.html |
327 (plus screen shots) | http://www.raymond.cc/blog/archives/2006/09/02/how-to-hack-into-a-windows-xp-computer-without-changing-password/ |
Chapter 5 – Single source makes up the entire chapter
Number of words | Source |
1081 | http://starbase.airweb.net/tech/hack-faq.html |
Chapter 7
Chapter 8
Number of words | Source |
2559 (includes screen shots) | http://www.squidoo.com/spyphone_flexispy |
1239 | http://www.securityfocus.com/infocus/1829 |
756 | http://www.spyphoneguy.com/page/4/ |
666 | http://www.spectorsoft.co.uk/products/index.html?UK=true |
500 | http://www.keyloggers2010.com/index.html |
Chapter 9
Number of words | Source |
2195 | http://www.nmrc.org/pub/faq/hackfaq/hackfaq-08.html |
1750 (includes 29 screen shots) | http://www.ethicalhacker.net/content/view/106/24/ |
942 (includes 20 screen shots) | http://www.dedoimedo.com/computers/backtrack.html |
Chapter 10 – Single source makes up the entire chapter
Number of words | Source |
2940 | http://starbase.airweb.net/tech/hack-faq.html |
Chapter 11
Number of words | Source |
1967 | http://docs.athenawebsecurity.com/ceh_athena/CEH.pdf |
1870 | http://starbase.airweb.net/tech/hack-faq.html |
Chapter 12
Number of words | Source |
5894 | http://www.informit.com/articles/article.aspx?p=472323&seqNum=5 |
59 | http://www.nmrc.org/pub/faq/hackfaq/hackfaq-19.html |
Much of the last half of the book is single chapter cut and paste, in which a single large source makes up the entire text of chapters 13, 14, 15, 18, 19, 20, and 21.
Chapter 13
Number of words | Source |
696 | http://www.nmrc.org/pub/faq/hackfaq/hackfaq-27.html |
Chapter 14
Number of words | Source |
1488 | http://www.nmrc.org/pub/faq/hackfaq/hackfaq-28.html |
Chapter 15
Number of words | Source |
677 | http://www.nmrc.org/pub/faq/hackfaq/hackfaq-29.html |
Chapter 18
Number of words | Source |
2962 | http://ethicalhacking.org.ua/8794final/lib0063.html |
Chapter 19
Number of words | Source |
2025 | http://hacker-dox.net/Que-Certified.Ethical.Hacker.E/0789735318/ch07lev1sec4.htmlhttp://docs.athenawebsecurity.com/ceh_athena/CEH.pdf |
Chapter 20
Number of words | Source |
3593 | http://docs.athenawebsecurity.com/ceh_athena/CEH.pdf |
Chapter 21
Number of words | Source |
4106 | http://www.cnhacker.com/bbs/read.php?tid=161454&fpage=8 |
Chapter 23
Number of pages | Source |
6 | Scanned article directly from http://hakin9.org/magazine/995-hardware-keylogger-a-serious-threat |
Ben Rothke, CISSP is the author of Computer Security: 20 Things Every Employee Should Know, and now knows more about section 107 of the copyright law than he would like to admit.