⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 hackers who break into computer systems.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 4 页
字号:
are incompetent, or ``it's not nice to say bad things about hackers.''In the N.Y. Times, John Markoff [Markoff90] wrote that the hackerwho claimed to have broken into Cliff Stoll's system said he wasupset by Stoll's portrayal of hackers in ``The Cuckoo's Egg''[Stoll90].   Markoff reported that the caller said: ``He [Stoll]was going on about how he hates all hackers, and he gave pretty muchof a one-sided view of who hackers are.'' ``The Cuckoo's Egg'' captures much of the popular stereotypes ofhackers.  Criminologist Jim Thomas criticizes it for presenting asimplified view of the world, one where everything springs from theforces of light (us) or of darkness (hackers) [Thomas90].  He claimsthat Stoll fails to see the similarities between his own activities(e.g., monitoring communications, ``borrowing'' monitors withoutauthorization, shutting off network access without warning, and lyingto get information he wants) and those of hackers.  He points outStoll's use of pejorative words such as ``varmint'' to describehackers, and Stoll's quote of a colleague: ``They're technicallyskilled but ethically bankrupt programmers without any respect forothers' work -- or privacy.  They're not destroying one or twoprograms.  They're trying to wreck the cooperation that builds ournetworks.'' [Stoll90, p. 159]  Thomas writes ``at an intellectuallevel,  [Stoll] provides a persuasive, but simplistic, moral imageryof the nature of right and wrong, and provides what -- to a lay reader-- would seem a compelling justification for more statutes and severepenalties against the computer underground.  This is troublesomefor two reasons.  First, it leads to a mentality of social controlby law enforcement during a social phase when some would argue weare already over-controlled.  Second, it invokes a punishment modelthat assumes we can stamp out behaviors to which we object if onlywe apprehend and convict a sufficient number of violators. ...  Thereis little evidence that punishment will in the long run reduce anygiven offense, and the research of Gordon Meyer and I suggests thatcriminalization may, in fact, contribute to the growth of the computerunderground.''  6. Public Image and Treatment Hackers express concern about their negative public image andidentity.  As noted earlier, hackers are often portrayed as beingirresponsible and immoral.  One hacker said that ``governmentpropaganda is spreading an image of our being at best, sub-human,depraved, criminally inclined, morally corrupt, low life.  We needto prove that the activities that we are accused of (crashing systems,interfering with life support equipment, robbing banks, and jamming911 lines) are as morally abhorent to us as they are to the generalpublic.'' The public identity of an individual or group is generated in partby the actions of the group interacting with the standards of thecommunity observing those actions.  What then accounts for thedifference between the hacker's public image and what they say aboutthemselves?  One explanation may be the different standards.  Outsidethe hacking community, the simple act of breaking into systems isregarded as unethical by many.  The use of pejorative words like``vandal'' and ``varmint'' reflect this discrepency in ethics.  Eventhe word ``criminal'' carries with it connotations of someone evil;hackers say they are not criminal in this sense.  Katie Hafner notesthat Robert Morris, who was convicted of launching the Internet worm,was likened to a terrorist even though the worm did not destroy data[Hafner90]. Distortions of events and references to potential threats also createan image of persons who are dangerous.  Regarding the 911 incidentwhere a hacker downloaded a file from Bell South, Goldstein reported``Quickly, headlines screamed that hackers had broken into the 911system and were interfering with emergency telephone calls to thepolice.  One newspaper report said there were no indications thatanyone had died or been injured as a result of the intrusions.  Whata relief.  Too bad it wasn't true.'' [Goldstein90]  In fact, thehackers involved with the 911 text file had not broken into the 911system.  The dollar losses attributed to hacking incidents also areoften highly inflated. Thomas and Meyer [ThomasMeyer90] say that the rhetoric depictinghackers as a dangerous evil contributes to a ``witch hunt'' mentality,wherein a group is first labeled as dangerous, and then enforcementagents are mobilized to exorcise the alleged social evil.  They seethe current sweeps against hackers as part of a reaction to a broaderfear of change, rather than to the actual crimes committed. Hackers say they are particularly concerned that computer securityprofessionals and system managers do not appear to understand hackersor be interested in their concerns.  Hackers say that system managerstreat them like enemies and criminals, rather than as potential helpersin their task of making their systems secure.  This may reflectmanagers' fears about hackers, as well as their responsibilitiesto protect the information on their systems.  Stallman says thatthe strangers he encounters using his account are more likely tohave a chip on their shoulder than in the past; he attributes thisto a harsh enforcer mentality adopted by the establishment.  He saysthat network system managers start out with too little trust anda hostile attitude toward strangers that few of the strangers deserve.One hacker said that system managers show a lack of openness to thosewho want to learn. Stallman also says that the laws make the hacker scared to communicatewith anyone even slightly ``official,'' because that person mighttry to track the hacker down and have him or her arrested.  Drakeraised the issue of whether the laws could differentiate betweenmalicious and nonmalicious hacking, in support of a ``kinder, gentler''relationship between hackers and computer security people.  In fact,many states such as California initially passed computer crime lawsthat excluded malicious hacking; it was only later that these lawswere amended to include nonmalicious actions [HollingerLanza-Kaduce88].Hollinger and Lanza-Kaduce speculate that these amendments and othernew laws were catalyzed mainly by media events, especially the reportson the ``414 hackers'' and the movie ``War Games,'' which createda perception of hacking as extremely dangerous, even if that perceptionwas not based on facts. Hackers say they want to help system managers make their systemsmore secure.  They would like managers to recognize and use theirknowledge about design flaws and the outsider threat problem.Landreth [Landreth89] suggests ways in which system managers canapproach hackers in order to turn them into colleagues, and Goodfellowalso suggests befriending hackers [Goodfellow83].  John Draper (Cap'nCrunch) says it would help if system managers and the operators ofphone companies and switches could coopererate in tracing a hackerwithout bringing in law enforcement authorities. Drake suggests giving hackers free access in exchange for helpingwith security, a suggestion that I also heard from several hackers.Drake says that the current attitude of treating hackers as enemiesis not very conducive to a solution, and by belittling them, we onlycause ourselves problems. I asked some of the hackers whether they'd be interested in breakinginto systems if the rules of the ``game'' were changed so that insteadof being threatened by prosecution, they were invited to leave a``calling card'' giving their name, phone number, and method ofbreaking in.  In exchange, they would get recognition and pointsfor each vulnerability they discovered.  Most were interested inplaying; one hacker said he would prefer monetary reward since hewas supporting himself.  Any system manager interested in tryingthis out could post a welcome message inviting hackers to leave theircards.  This approach could have the advantage of not only lettingthe hackers contribute to the security of the system, but of allowingthe managers to quickly recognize the potentially malicious hackers,since they are unlikely to leave their cards.  Perhaps if hackersare given the opportunity to make contributions outside theunderground, this will dampen their desire to pursue illegal activities. Several hackers said that they would like to be able to pursue theiractivities legally and for income.  They like breaking into systems,doing research on computer security, and figuring out how to protectagainst vulnerabilities.  They say they would like to be in a positionwhere they have permission to hack systems.  Goodfellow suggestshiring hackers to work on tiger teams that are commissioned to locatevulnerabilities in systems through penetration testing.  BairdInfo-Systems Safeguards, Inc., a security consulting firm, reportsthat they have employed hackers on several assignments [Baird87].They say the hackers did not violate their trust or the trust oftheir clients, and performed in an outstanding manner.  Baird believesthat system vulnerabilities can be better identified by employingpeople who have exploited systems. One hacker suggested setting up a clearinghouse that would matchhackers with companies that could use their expertise, whilemaintaining anonymity of the hackers and ensuring confidentialityof all records.  Another hacker, in describing an incident wherehe discovered a privileged account without a password, said ``WhatI (and others) wish for is a way that hackers can give informationlike this to a responsible source, AND HAVE HACKERS GIVEN CREDITFOR HELPING! As it is, if someone told them that `I'm a hacker, andI REALLY think you should know...' they would freak out, and runscreaming to the SS [Secret Service] or the FBI. Eventually, theperson who found it would be caught, and hauled away on some crazycharge.  If they could only just ACCEPT that the hacker was tryingto help!''  The clearinghouse could also provide this type of service. Hackers are also interested in security policy issues.  Drake expressedconcern over how we handle information about computer securityvulnerabilities.  He argues that it is better to make this informationpublic than cover it up and pretend that it does not exist, and citesthe CERT to illustrate how this approach can be workable.  Otherhackers, however, argue for restricting initial dissemination offlaws to customers and users.  Drake also expressed concern aboutthe role of the government, particularly the military, incryptography.  He argues that NSA's opinion on a cryptographic standardshould be taken with a large grain of salt because of their codebreaking role. Some security specialists are opposed to hiring hackers for securitywork, and Eugene Spafford has urged people not to do business withany company that hires a convicted hacker to work in the securityarea [ACM90].  He says that ``This is like having a known arsonistinstall a fire alarm.''   But, the laws are such that a person canbe convicted for having done nothing other than break into a system;no serious damage (i.e., no ``computer arson'') is necessary.  Manyof our colleagues admit to having broken into systems in the past,e.g., Geoff Goodfellow [Goodfellow83] and Brian Reid [Frenkel87];Reid is quoted as saying that because of the knowledge he gainedbreaking into systems as a kid, he was frequently called in to helpcatch people who break in.  Spafford says that times have changed,and that this method of entering the field is no longer sociallyacceptable, and fails to provide adequate training in computer scienceand computer engineering [Spafford89].  However, from what I haveobserved, many hackers do have considerable knowledge abouttelecommunications, data security, operating systems, programminglanguages, networks, and cryptography.  But, I am not challenginga policy to hire competent people of sound character.  Rather, I amchallenging a strict policy that uses economic pressure to closea field of activity to all persons convicted of breaking intosystems.   It is enough that a company is responsible for the behaviorof its employees.  Each hacker can be considered for employment basedon his or her own competency and character. Some people have called for stricter penalties for hackers, includingprison terms, in order to send a strong deterrent message to hackers.John Draper, who was incarcerated for his activities in the 1970's,argues that in practice this will only make the problem worse.  Hetold me that he was forced under threat to teach other inmates hisknowledge of communications systems.  He believes that prison sentenceswill serve only to spread hacker's knowledge to career criminals.He said he was never approached by criminals outside the prison,but that inside the prison they had control over him. One hacker said that by clamping down on the hobbyist underground,we will only be left with the criminal underground.  He said thatwithout hackers to uncover system vulnerabilities, the holes willbe left undiscovered, to be utilized by those likely to cause realdamage. Goldstein argues that the existing penalties are already way outof proportion to the acts committed, and that the reason is becauseof computers [Goldstein89].  He says that if Kevin Mitnick hadcommitted crimes similar to those he committed but without a computer,he would have been classified as a mischief maker and maybe fined$100 for trespassing; instead, he was put in jail without bail[Goldstein89].  Craig Neidorf, a publisher and editor of the electronicnewsletter ``Phrack,'' faces up to 31 years and a fine of $122,000for receiving, editing, and transmitting the downloaded text fileon the 911 system [Goldstein90].  7.  Privacy and the First and Fourth Amendments The hackers I spoke with advocated privacy protection for sensitiveinformation about individuals.   They said they are not interestedin invading people's privacy, and that they limited their hackingactivities to acquiring information about computer systems or howto break into them.  There are, of course, hackers who break intosystems such as the TRW credit database.  Emanuel Goldstein arguesthat such invasions of privacy took place before the hacker arrived[Harpers90].  Referring to credit reports, government files, motorvehicle records, and the ``megabytes of data piling up about eachof us,'' he says that thousands of people legally can see and usethis data, much of it erroneous.  He claims that the public has beenmisinformed about the databases, and that hackers have becomescapegoats for the holes in the systems.  One hacker questioned thepractice of storing sensitive personal information on open systemswith dial-up access, the accrual of the information, the methodsused to acquire it, and the purposes to which it is put.  Anotherhacker questioned the inclusion of religion and race in credit records. Drake told me that he was concerned about the increasing amount ofinformation about individuals that is stored in large data banks,and the inability of the individual to have much control over theuse of that information.  He suggests that the individual might beco-owner of information collected about him or her, with controlover the use of that information.  He also says that an individualshould be free to withhold personal information, of course payingthe consequences of doing so (e.g., not getting a drivers licenseor credit card).  (In fact, all Federal Government forms are requiredto contain a Privacy Act Statement that states how the informationbeing collected will be used and, in some cases, giving the optionof withholding the information.) Goldstein has also challenged the practices of law enforcement agenciesin their attempt to crack down on hackers [Goldstein90].  He saidthat all incoming and outgoing electronic mail used by ``Phrack''was monitored before the newsletter was shutdown by authorities.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -