📄 hackers who break into computer systems.txt
字号:
systems, work in groups, write, and teach others. One hacker saidthat he belongs to a study group with the mission of churning outfiles of information and learning as much as possible. Within thegroup, people specialize, collaborate on research project, shareinformation and news, write articles, and teach other about theirareas of specialization. Hackers have set up a private system ofeducation that engages them, teaches them to think, and allows themto apply their knowledge in purposeful, if not always legal,activity. Ironically, many of our nation's classrooms have beencriticized for providing a poor learning environment that seems toemphasize memorization rather than thinking and reasoning. One hackerreported that through volunteer work with a local high school, hewas trying to get students turned on to learning. Many hackers say that the legitimate computer access they have throughtheir home and school computers do not meet their needs. One studenttold me that his high school did not offer anything beyond elementarycourses in BASIC and PASCAL, and that he was bored by these. HansHuebner, a hacker in Germany who goes by the name Pengo, wrote ina note to the RISKS Forum [Huebner89] : ``I was just interested incomputers, not in the data which has been kept on their disks. AsI was going to school at that time, I didn't even have the moneyto buy [my] own computer. Since CP/M (which was the most sophisticatedOS I could use on machines which I had legal access to) didn't turnme on anymore, I enjoyed the lax security of the systems I had accessto by using X.25 networks. You might point out that I should havebeen patient and wait[ed] until I could go to the university anduse their machines. Some of you might understand that waiting wasjust not the thing I was keen on in those days.'' Brian Harvey, in his position paper [Harvey86] for the ACM Panel onHacking, claims that the computer medium available to students, e.g.,BASIC and floppy disks, is inadequate for challenging intellectualwork. His recommendation is that students be given access to realcomputing power, and that they be taught how to use that powerresponsibly. He describes a program he created at a public high schoolin Massachusetts during the period 1979-1982. They installed aPDP-11/70 and let students and teachers carry out the administrationof the system. Harvey assessed that putting the burden of dealingwith the problems of malicious users on the students themselves wasa powerful educational force. He also noted that the students whohad the skill and interest to be password hackers were discouragedfrom this activity because they also wanted to keep the trust oftheir colleagues in order that they could acquire ``superuser'' statuson the system. Harvey also makes an interesting analogy between teaching computingand teaching karate. In karate instruction, students are introducedto the real, adult community. They are given access to a powerful,deadly weapon, and at the same time are taught discipline and tonot abuse the art. Harvey speculates that the reason that studentsdo not misuse their power is that they know they are being trustedwith something important, and they want to live up to that trust.Harvey applied this principle when he set up the school system. The ACM panel endorsed Harvey's recommendation, proposing athree-tiered computing environment with local, district-wide, andnation-wide networks. They recommended that computer professionalsparticipate in this effort as mentors and role models. They alsorecommended that outside of schools, government and industry beencouraged to establish regional computing centers using donatedor re-cycled equipment; that students be apprenticed to local companieseither part-time on a continuing basis or on a periodic basis; and,following a suggestion from Felsenstein [Felsenstein86] for a``Hacker's League,'' that a league analogous to the Amateur RadioRelay League be established to make contributed resources availablefor educational purposes. Drake said he liked these recommendations. He said that if hackerswere given access to powerful systems through a public account system,they would supervise themselves. He also suggested that ComputerResource Centers be established in low-income areas in order to helpthe poor get access to information. Perhaps hackers could help runthe centers and teach the members of the community how to use thefacilities. One of my colleagues suggested cynically that the hackerswould only use this to teach the poor how to hack rich people'ssystems. A hacker responded by saying this was ridiculous; hackerswould not teach people how to break into systems, but rather howto use computers effectively and not be afraid of them.In addition, the hackers I spoke with who had given up illegalactivities said they stopped doing so when they got engaged in otherwork. Geoff Goodfellow and Richard Stallman have reported that they havegiven hackers accounts on systems that they manage, and that thehackers have not misused the trust granted to them. Perhapsuniversities could consider providing accounts to pre-college studentson the basis of recommendations from their teachers or parents.The students might be challenged to work on the same homework problemsassigned in courses or to explore their own interests. Studentswho strongly dislike the inflexibility of classroom learning mightexcel in an environment that allows them to learn on their own, inmuch the way that hackers have done. 4. Thrill, Excitement, and Challenge One hacker wrote that ``Hackers understand something basic aboutcomputers, and that is that they can be enjoyed. I know none whohack for money, or hack to frighten the company, or hack for anythingbut fun.'' In the words of another hacker, ``Hacking was the ultimate cerebralbuzz for me. I would come home from another dull day at school,turn my computer on, and become a member of the hacker elite. Itwas a whole different world where there were no condescending adultsand you were judged only by your talent. I would first check into the private Bulletin Boards where other people who were like mewould hang out, see what the news was in the community, and tradesome info with people across the country. Then I would start actuallyhacking. My brain would be going a million miles an hour and I'dbasically completely forget about my body as I would jump from onecomputer to another trying to find a path into my target. It wasthe rush of working on a puzzle coupled with the high of discoverymany magnitudes intensified. To go along with the adrenaline rushwas the illicit thrill of doing something illegal. Every step I madecould be the one that would bring the authorities crashing down onme. I was on the edge of technology and exploring past it, spelunkinginto electronic caves where I wasn't supposed to be.'' The other hackers I spoke with made similar statements about thefun and challenge of hacking. In SPIN magazine [Dibbel90], reporterJulian Dibbell speculated that much of the thrill comes from thedangers associated with the activity, writing that ``the technologyjust lends itself to cloak-and-dagger drama,'' and that ``hackerswere already living in a world in which covert action was nothingmore than a game children played.'' Eric Corley [Corley89] characterizes hacking as an evolved form ofmountain climbing. In describing an effort to construct a list ofactive mailboxes on a Voice Messaging System, he writes ``I supposethe main reason I'm wasting my time pushing all these buttons issimply so that I can make a list of something that I'm not supposedto have and be the first person to accomplish this.'' He said thathe was not interested in obtaining an account of his own on the system.Gordon Meyer says he found this to be a recurring theme: ``We aren'tsupposed to be able to do this, but we can'' -- so they do. One hacker said he was now working on anti-viral programming. Hesaid it was almost as much fun as breaking into systems, and thatit was an intellectual battle against the virus author. 5. Ethics and Avoiding Damage All of the hackers I spoke with said that malicious hacking was morallywrong. They said that most hackers are not intentionally malicious,and that they themselves are concerned about causing accidentaldamage. When I asked Drake about the responsibility of a personwith a PC and modem, his reply included not erasing or modifyinganyone else's data, and not causing a legitimate user on a systemany problems. Hackers say they are outraged when other hackers causedamage or use resources that would be missed, even if the resultsare unintentional and due to incompetence. One hacker wrote ``Ihave ALWAYS strived to do NO damage, and inconvenience as few peopleas possible. I NEVER, EVER, EVER DELETE A FILE. One of the firstcommands I do on a new system is disable the delete file command.''Some hackers say that it is unethical to give passwords and similarsecurity-related information to persons who might do damage. Inthe recent incident where a hacker broke into Bell South and downloadeda text file on the emergency 911 service, hackers say that therewas no intention to use this knowledge to break into or sabotagethe 911 system. According to Emmanuel Goldstein [Goldstein90], thefile did not even contain information about how to break into the911 system. The hackers also said that some break-ins were unethical, e.g.,breaking into hospital systems, and that it is wrong to readconfidential information about individuals or steal classifiedinformation. All said it was wrong to commit fraud for personalprofit. Although we as computer security professionals often disagree withhackers about what constitutes damage, the ethical standards listedsound much like our own. Where the hackers' ethics differs fromthe standards adopted by most in the computer security communityis that hackers say it is not unethical to break into many systems,use idle computer and communications resources, and download systemfiles in order to learn. Goldstein says that hacking is not wrong:it is not the same as stealing, and uncovers design flaws and securitydeficiencies [Goldstein89]. Brian Reid speculates that a hacker's ethics may come from not beingraised properly as a civilized member of society, and not appreciatingthe rules of living in society. One hacker responded to this with``What does `being brought up properly' mean? Some would say thatit is `good' to keep to yourself, mind your own business. Othersmight argue that it is healthy to explore, take risks, be curiousand discover.'' Brian Harvey [Harvey86] notes that many hackers areadolescents, and that adolescents are at a less developed stage ofmoral development than adults, where they might not see how the effectsof their actions hurt others. Larry Martin [Martin89] claims thatparents, teachers, the press, and others in society are not awareof their responsibility to contribute to instilling ethical valuesassociated with computer use. This could be the consequence of theyouth of the computing field; many people are still computer illiterateand cultural norms may be lagging behind advances in technology andthe growing dependency on that technology by businesses and society.Hollinger and Lanza-Kaduce speculate that the cultural normativemessages about the use and abuse of computer technology have beendriven by the adaption of criminal laws [HollingerLanza-Kaduce88],which have been mainly in the last decade. They also speculate thathacking may be encouraged during the process of becoming computerliterate. Some of my colleagues say that hackers are irresponsible.One hacker responded ``I think it's a strong indication of the amountof responsibility shown that so FEW actually DAMAGING incidents areknown.'' But we must not overlook that the differences in ethics also reflecta difference in philosophy about information and information handlingresources; whereas hackers advocate sharing, we seem to be advocatingownership as property. The differences also represent an opportunityto examine our own ethical behavior and our practices for informationsharing and protection. For example, one hacker wrote ``I will acceptthat it is morally wrong to copy some proprietary software, however,I think that it is morally wrong to charge $6000 for a program thatis only around 25K long.'' Hence, I shall go into a few of the ethicalpoints raised by hackers more closely. It is not a simple case ofgood or mature (us) against bad or immature (hackers), or of teachinghackers a list of rules. Many computer professionals argue the moral questions by analogy,e.g., see Martin [Martin89]. The analogies are then used to justifytheir judgement of a hacker's actions as unethical. Breaking intoa system is compared with breaking into a house, and downloadinginformation and using computer and telecommunications services iscompared with stealing tangible goods. But, say hackers, thesituations are not the same. When someone breaks into a house, theobjective is to steal goods, which are often irreplaceable, andproperty is often damaged in the process. By contrast, when a hackerbreaks into a system, the objective is to learn and avoid causingdamage. Downloaded information is copied, not stolen, and stillexists on the original system. Moreover, as noted earlier, informationhas not been traditionally regarded as property. Dibbel [Dibbel90]says that when the software industries and phone companies claimlosses of billions of dollars to piracy, they are not talking aboutgoods that disappear from the shelves and could have been sold. We often say that breaking into a system implies a lack of caringfor the system's owner and authorized users. But, one hacker saysthat the ease of breaking into a system reveals a lack of caringon the part of the system manager to protect user and company assets,or failure on the part of vendors to warn managers about thevulnerabilities of their systems. He estimated his success rateof getting in at 10-15%, and that is without spending more than anhour on any one target system. Another hacker says that he seesmessages from vendors notifying the managers, but that the managersfail to take action. Richard Pethia of CERT (Computer Emergency Response Team) reportsthat they seldom see cases of malicious damage caused by hackers,but that the break-ins are nevertheless disruptive because systemusers and administrators want to be sure that nothing was damaged.(CERT suggests that sites reload system software from secure backupsand change all user passwords in order to protect against possibleback doors and Trojan Horses that might have been planted by thehacker. Pethia also noted that prosecutors are generally calledfor government sites, and are being called for non-government siteswith increasing frequency.) Pethia says that break-ins also generatea loss of trust in the computing environment, and may lead to adoptionof new policies that are formulated in a panic or management edictsthat severely restrict connectivity to outside systems. Brian Harveysays that hackers cause damage by increasing the amount of paranoia,which in turn leads to tighter security controls that diminish thequality of life for the users. Hackers respond to these points bysaying they are the scapegoats for systems that are not adequatelyprotected. They say that the paranoia is generated by ill-foundedfears and media distortions (I will return to this point later),and that security need not be oppressive to keep hackers out; itis mainly making sure that passwords and system defaults arewell-chosen. Pethia says that some intruders seem to be disruptive to prove apoint, such as that the systems are vulnerable, the security personnel
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -