United States Flag, love it or fuck off...
                                                                     Flag of Italy: We respect our Motherland.                                     A home... a place to go when you want to see the other side...

Los Angeles, California ~
SmallTech / Monte Enbysk

The first thing to know about computer "hackers" is that the term itself is a point of dispute.
Many people who hack into systems without criminal intent proudly label themselves "hackers," and say they're the good guys and the bad guys should be called "crackers" or something else. "Hackers are not evil, malicious people out to damage computer systems and steal passwords. Hackers hate these kind of people," read one e-mail I got after my recent column about virus writers.
Others argue that "hackers" represent both good and bad guys — people who explore and "test" systems for a living or a hobby, as well as those who break into systems to embarrass or rip off companies and people. "Just like in the Wizard of Oz, there can be good witches and bad witches. In the world of hacking, it goes the same way," wrote a reader.
Indeed, all "hackers" aren't criminals. Both good and bad share a common bond and form a highly caffeinated community where the lines get blurred. At several hacker conventions each year, they talk, among other things, about networks compromised, databases mined, or products where they've found holes. Some are like Marc Maiffret, 21, who calls himself "chief hacking officer" at eEye Digital Security in southern California. They begin hacking networks as naive teenagers, learn the ropes and then put it to use as consultants or corporate security czars.
My purpose with this column is to explore the mindset of people who break into systems with malicious intent, and then to offer suggestions on how to protect your own system. These people, predominantly males, represent serious threats to the safety of networks and users. Bob Sullivan, a veteran MSNBC.com reporter who's covered the hacker community for five years, refers to the threatening ones as "computer criminals," "attackers" or "online thugs" — something other than "hacker" to avoid confusion or controversy. I'll follow his lead.
Important things to know about the bad guys:
·    Hackers in general, and computer criminals in particular, love the power of control. "For many, it's more about the thrill of technology than active malice," says Richard Ford, a security expert and former chief technology officer for Cenetec Ventures. "It's a puzzle to solve, a game to play. For some, it's about money, although these seem to be few and far between." Adds Simson Garfinkel, chief technology officer for Sandstorm Enterprises and an author of several books on security: "The bad guys want to control as many machines as possible. The majority are in it for fun. They attack the machines of their enemies and of companies. Yet many who break in for fun graduate to breaking in for monetary gain."
·    They cause the most damage with data theft and fraud. While technology today is generally becoming more secure, breakdowns are continually exploited and the Internet is ballooning so fast that online thugs have new opportunities EVERY time they boot up. According to statistics from Carnegie Mellon University, the number of cyber-security incidents — break-ins, virus attacks, etc. — doubled in 2001 to nearly 53,000. In the first three months of 2002, nearly 27,000 incidents were counted. While viruses remain the most common type of cyber-attack, an FBI/Computer Security Institute survey in April 2002 found those aren't the most damaging. The 500 survey respondents reported a total annual loss of $170.8 million due to theft of proprietary data, $115.7 million due to financial fraud and $50 million due to insider abuse of Internet access, compared to $49.9 million from viruses.
Another recent study cited by The Washington Post found that Internet attacks worldwide were up 28% in the first six months of 2002, with most coming against U.S. technology, financial services and power companies.
·    Many companies allow attackers to get away with it. The same FBI survey cited above found that only 34% of the respondents reported computer breaches to authorities. Many cited fears of potential bad publicity. MSNBC's Sullivan illustrated just how attackers can take advantage of companies in a June story about his e-mail interview with "Zilterio," a noted extortionist whose real identity is a mystery. For more than a year, Zilterio has hacked into financial institutions and online businesses, stealing data and then demanding extortion payments. He claims nine firms have paid him $150,000 in "quiet money." While this claim can't be verified, Zilterio is indeed sought by the FBI for extortion, Sullivan reports.
·    Any business with a Web site is a target. Many of today's online thugs set up scanners to track unprotected Web sites and networks to attack, says Garfinkel, co-author of "Web Security, Privacy and Commerce." Some can scan hundreds or thousands of sites in a matter of seconds. Garfinkel's own site is protected by a firewall that can track how many times it has been scanned by potential intruders. One recent day, he counted 289,000 different scans, including 1,044 by the same would-be attacker. "Once they find a vulnerable site, they set up their attack tools," he says. Adds eEye's Maiffret: "Know that you could be a target. It doesn't matter what business you are in."
·    Attackers will get bolder — with blended threats? That's the fear of Sarah Gordon, senior research fellow at Symantec's security response unit and an expert on the psychology of computer criminals. By "blended threats," she means break-ins combined with virus infections and other methods of destruction, all of which could take down companies' networks in a matter of minutes. Ford agrees. "Massive numbers of systems could be compromised, leading to huge, nationwide outages. Fortunately, we haven't seen this happen. But I do believe it's a matter of when, not if." So much of the software on computers today is similar, he says, so a problem for one computer is likely to be replicated in others. Gordon adds that with mobile phones and other devices connecting networks to the Internet, attackers have more entry points.
So, how can you protect yourself? Here's what the experts say.
1.    Have the best security protection you can afford. I discuss the basics in this story. But companies with sensitive data need to go beyond basics and get intrusion-detection systems and, perhaps, software that pinpoints the vulnerabilities of your system and recommends fixes (see the eEye site for more information). Never get complacent — criminal hackers thrive on penetrating "secure" systems.
2.    Develop your own company's security policy and guidelines. Put it in writing, and make security a companywide effort. Don't let your employees get away with leaking sensitive information — absent-mindedly or otherwise.
3.    Invest in your security personnel. They need tools, training, resources and some authority to make decisions. For many small businesses, managed security services by third-party vendors are the best option, Gordon says.
4.    Report computer breaches, and don't cave in to extortion threats. If you are victimized, authorities should be notified, as embarrassing as it may be to you. If you're confronted by an extortionist, don't automatically assume the criminal has all the info he needs to ruin your business. It may be a prankster testing you. "If you aren't intimidated, there may be nothing he can do," says Sullivan, who hears a lot about these pranks. "Bottom line, know your leverage."
5.    Get up to speed on the proposed Cyber Security Enhancement Act of 2002. This bill, HR 3482, was overwhelmingly passed by the U.S. House of Representatives and is now before the Senate. It allows judges to issue life prison sentences to malicious hackers. It amends the current sentencing guidelines and allows judges to consider intent, violations of privacy rights and the sophistication of the offense, as well as actual loss. This bill may not be perfect, but I believe tougher sentences are needed.
6.    Educate young people on computer morals and ethics. As discussed in my virus writers column, Gordon believes strongly that today's young people need more guidance from parents and teachers on what's right and wrong on a computer. A greater emphasis now may mean fewer computer crimes tomorrow.



OUR THING HOME
1