⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 hackers who break into computer systems.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 4 页
字号:
 To be presented at the 13th National Computer Security Conference,Washington, D.C., Oct. 1-4, 1990.            Concerning Hackers Who Break into Computer Systems                          Dorothy E. Denning           Digital Equipment Corp., Systems Research Center               130 Lytton Ave., Palo Alto, CA 94301                 415-853-2252, denning@src.dec.com  Abstract A diffuse group of people often called ``hackers'' has beencharacterized as unethical, irresponsible, and a serious danger tosociety for actions related to breaking into computer systems.  Thispaper attempts to construct a picture of hackers, their concerns,and the discourse in which hacking takes place.  My initial findingssuggest that hackers are learners and explorers who want to helprather than cause damage, and who often have very high standardsof behavior.  My findings also suggest that the discourse surroundinghacking belongs at the very least to the gray areas between largerconflicts that we are experiencing at every level of society andbusiness in an information age where many are not computer literate.These conflicts are between the idea that information cannot be ownedand the idea that it can, and between law enforcement and the Firstand Fourth Amendments.  Hackers have raised serious issues aboutvalues and practices in an information society.  Based on my findings,I recommend that we work closely with hackers, and suggest severalactions that might be taken.  1.  Introduction The world is crisscrossed with many different networks that are usedto deliver essential services and basic necessities -- electric power,water, fuel, food, goods, to name a few.  These networks are allpublicly accessible and hence vulnerable to attacks, and yet virtuallyno attacks or disruptions actually occur. The world of computer networking seems to be an anomaly in thefirmament of networks.  Stories about attacks, breakins, disruptions,theft of information, modification of files, and the like appearfrequently in the newspapers.  A diffuse group called ``hackers''is often the target of scorn and blame for these actions.  Why arecomputer networks any different from other vulnerable public networks?Is the difference the result of growing pains in a young field?Or is it the reflection of deeper tensions in our emerging informationsociety? There are no easy or immediate answers to these questions.  Yet itis important to our future in a networked, information-dependentworld that we come to grips with them.  I am deeply interested inthem.  This paper is my report of what I have discovered in the earlystages of what promises to be a longer investigation.  I haveconcentrated my attention in these early stages on the hackersthemselves.  Who are they?  What do they say?  What motivates them?What are their values?  What do that have to say about public policiesregarding information and computers?  What do they have to say aboutcomputer security? From such a profile I expect to be able to construct a picture ofthe discourses in which hacking takes place.  By a discourse I meanthe invisible background of assumptions that transcends individualsand governs our ways of thinking, speaking, and acting.  My initialfindings lead me to conclude that this discourse belongs at the veryleast to the gray areas between larger conflicts that we areexperiencing at every level of society and business, the conflictbetween the idea that information cannot be owned and the idea thatit can, and the conflict between law enforcement and the First andFourth Amendments. But, enough of the philosophy.  On with the story!  2.  Opening Moves In late fall of 1989, Frank Drake (not his real name), Editor ofthe now defunct cyberpunk magazine W.O.R.M., invited me to beinterviewed for the magazine.  In accepting the invitation, I hopedthat something I might say would discourage hackers from breakinginto systems.  I was also curious about the hacker culture.  Thisseemed like a good opportunity to learn about it. The interview was conducted electronically.  I quickly discoveredthat I had much more to learn from Drake's questions than to teach.For example, he asked: ``Is providing computer security for largedatabases that collect information on us a real service?  How doyou balance the individual's privacy vs. the corporations?''  Thisquestion surprised me.  Nothing that I had read about hackers eversuggested that they might care about privacy.  He also asked: ``Whathas [the DES] taught us about what the government's (especially NSA's)role in cryptography should be?''  Again, I was surprised to discovera concern for the role of the government in computer security.  Idid not know at the time that I would later discover considerableoverlap in the issues discussed by hackers and those of other computerprofessionals. I met with Drake to discuss his questions and views.  After ourmeeting, we continued our dialog electronically with me interviewinghim.  This gave me the opportunity to explore his views in greaterdepth.  Both interviews appear in ``Computers Under Attack,''edited by Peter Denning [DenningP90]. My dialog with Drake increased my curiosity about hackers.  I readarticles and books by or about hackers.  In addition, I had discussionswith nine hackers whom I will not mention by name.  Their ages rangedfrom 17 to 28. The word ``hacker'' has taken on many different meanings rangingfrom 1) ``a person who enjoys learning the details of computer systemsand how to stretch their capabilities'' to 2) ``a malicious orinquisitive meddler who tries to discover information by poking around.. possibly by deceptive or illegal means ...'' [Steele83]  Thehackers described in this paper satisfy both of these definitions,although all of the hackers I spoke with said they did not engagein or approve of malicious acts that damage systems or files.  Thus,this paper is not about malicious hackers.  Indeed, my research sofar suggests that there are very few malicious hackers.   Neitheris this paper about career criminals who, for example, defraudbusinesses, or about people who use stolen credit cards to purchasegoods.  The characteristics of many of the hackers I am writing aboutare summed up in the words of one of the hackers: ``A hacker is someonethat experiments with systems... [Hacking] is playing with systemsand making them do what they were never intended to do.  Breakingin and making free calls is just a small part of that.  Hacking isalso about freedom of speech and free access to information -- beingable to find out anything.  There is also the David and Goliath sideof it, the underdog vs. the system, and the ethic of being a folkhero, albeit a minor one.'' Richard Stallman, founder of the Free Software Foundation who callshimself a hacker according to the first sense of the word above,recommends calling security-breaking hackers ``crackers''[Stallman84].  While this description may be more accurate, I shalluse the term ``hacker'' since the people I am writing about callthemselves hackers and all are interested in learning about computerand communication systems.  However, there are many people likeStallman who call themselves hackers and do not engage in illegalor deceptive practices; this paper is also not about those hackers. In what follows I will report on what I have learned about hackersfrom hackers.  I will organize the discussion around the principaldomains of concerns I observed.  I recommend Meyer's thesis [Meyer89]for a more detailed treatment of the hackers' social culture andnetworks, and Meyer and Thomas [MeyerThomas90] for an interestinginterpretation of the computer underground as a postmodernist rejectionof conventional culture that substitutes ``rational technologicalcontrol of the present for an anarchic and playful future.'' I do not pretend to know all the concerns that hackers have, nordo I claim to have conducted a scientific study.  Rather, I hopethat my own informal study motivates others to explore the areafurther.  It is essential that we as computer security professionalstake into account hackers' concerns in the design of our policies,procedures, laws regulating computer and information access, andeducational programs.  Although I speak about security-breaking hackersas a group, their competencies, actions, and views are not all thesame.  Thus, it is equally important that our policies and programstake into account individual differences. In focusing on what hackers say and do, I do not mean for a momentto set aside the concerns of the owners and users of systems thathackers break into, the concerns of law enforcement personnel, orour own concerns as computer security professionals.  But I dorecommend that we work closely with hackers as well as these othergroups to design new approaches and programs for addressing theconcerns of all.   Like ham radio operators, hackers exist, and itis in our best interest that we learn to communicate and work withthem rather than against them. I will suggest some actions that we might consider taking, and Iinvite others to reflect on these and suggest their own.  Many ofthese suggestions are from the hackers themselves; others came fromthe recommendations of the ACM Panel on Hacking [Lee86] and fromcolleagues. I grouped the hackers' concerns into five categories: access tocomputers and information for learning; thrill, excitement andchallenge; ethics and avoiding damage; public image and treatment;and privacy and first amendment rights.  These are discussed inthe next five subsections.  I have made an effort to present myfindings as uncritical observations.  The reader should not inferthat I either approve or disapprove of actions hackers take.  3.  Access to Computers and Information for Learning Although Levy's book ``Hackers'' [Levy84] is not about today'ssecurity-breaking hackers, it articulates and interprets a ``hackerethic'' that is shared by many of these hackers.  The ethic includestwo key principles that were formulated in the early days of theAI Lab at MIT: ``Access to computers -- and anything which mightteach you something about the way the world works -- should beunlimited and total,'' and ``All information should be free.''  Inthe context in which these principles were formulated, the computersof interest were research machines and the information was softwareand systems information. Since Stallman is a leading advocate of open systems and freedomof information, especially software, I asked him what he means bythis.  He said: ``I believe that all generally useful informationshould be free. By `free' I am not referring to price, but ratherto the freedom to copy the information and to adapt it to one's ownuses.''  By ``generally useful'' he does not include confidentialinformation about individuals or credit card information, for example.He further writes: ``When information is generally useful,redistributing it makes humanity wealthier no matter who isdistributing and no matter who is receiving.''  Stallman has arguedstrongly against user interface copyright, claiming that it doesnot serve the users or promote the evolutionary process [Stallman90]. I asked hackers whether all systems should be accessible and allinformation should be free.  They said that it is OK if some systemsare closed and some information, mainly confidential informationabout individuals, is not accessible.  They make a distinction betweeninformation about security technology, e.g., the DES, and confidentialinformation protected by that technology, arguing that it is theformer that should be accessible.   They said that information hoardingis inefficient and slows down evolution of technology.  They alsosaid that more systems should be open so that idle resources arenot wasted.  One hacker said that the high costs of communicationhurts the growth of the information economy. These views of information sharing seem to go back at least as faras the 17th and 18th Centuries.  Samuelson [Samuelson89] notes that``The drafters of the Constitution, educated in the Enlightenmenttradition, shared that era's legacy of faith in the enabling powersof knowledge for society as well as the individual.''  She writesthat our current copyright laws, which protect the expression ofinformation, but not the information itself, are based on the beliefthat unfettered and widespread dissemination of information promotestechnological progress. (Similarly for patent laws which protectdevices and processes, not the information about them.)  She citestwo recent court cases where courts reversed the historical trendand treated information as ownable property.  She raises questionsabout whether in entering the Information Age where information isthe source of greatest wealth, we have outgrown the Enlightenmenttradition and are coming to treat information as property. In a society where knowledge is said to be power, Drake expressedparticular concern about what he sees as a growing information gapbetween the rich and poor.  He would like to see information thatis not about individuals be made public, although it could stillbe owned.  He likes to think that companies would actually find itto their advantage to share information.  He noted how IBM's disclosureof the PC allowed developers to make more products for the computers,and how Adobe's disclosure of their fonts helped them compete againstthe Apple-Microsoft deal.  He recognizes that in our current politicalframework, it is difficult to make all information public, becausecomplicated structures have been built on top of an assumption thatcertain information will be kept secret.  He cites our defense policy,which is founded on secrecy for military information, as an example. Hackers say they want access to information and computing and networkresources in order to learn.  Both Levy [Levy84] and Landreth[Landreth89] note that hackers have an intense, compelling interestin computers and learning, and many go into computers as a profession.Some hackers break into systems in order to learn more about howthe systems work.  Landreth says these hackers want to remainundiscovered so that they can stay on the system as long as possible.Some of them devote most of their time to learning how to break thelocks and other security mechanisms on systems; their backgroundin systems and programming varies considerably.  One hacker wrote``A hacker sees a security hole and takes advantage of it becauseit is there, not to destroy information or steal.  I think ouractivities would be analogous to someone discovering methods ofacquiring information in a library and becoming excited and perhapsengrossed.'' We should not underestimate the effectiveness of the networks inwhich hackers learn their craft.  They do research, learn about

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -