GENWiki

Premier IT Outsourcing and Support Services within the UK

User Tools

Site Tools


archive:news:hunt
           HOUNDING TEENAGE HACKERS
           DON'T PLUG THOSE
           LEAKY COMPUTERS
         12/10/84
           THE PETULANT BOYS AND GIRLS WHO PLAY IN THE SANDBOX CALLED
        THE U.S. SENATE GOT INTO ONE OF THEIR TYPICAL TEMPER TANTRUMS
        IN THE LAST HOURS OF THE 98TH CONGRESS THIS FALL. THEY WERE
        SO BUSY SHOUTING AND CALLING EACH OTHER NAMES THAT NOBODY
        SEEMED INTERESTED IN PASSING ANY LEGISLATION.
           IN DESPERATION, THE SENATE LEADERSHIP DECIDED THAT THE
        ONLY WAY TO MAKE THESE MATURE, RESPONSIBLE PUBLIC SERVANTS DO
        THEIR WORK WAS TO HOLD AN ALL-NIGHT SESSION. A LONG LINE OF
        COTS WAS SET UP IN THE CAPITOL CORRIDORS. BETWEEN CATNAPS,
        OUR ELECTED LEADERS VOTED ON BILLS AND AMENDMENTS. IN THESE
        ABSURD CIRCUMSTANCES THE CONGRESS PASSED AN ABSURD PIECE OF
        COMPUTER LEGISLATION.
           THE NEW CRIMINAL STATUTE EMPOWERS THE TRW, WHICH
        PRESUMABLY HAS NOTHING BETTER TO DO, TO SNOOP AROUND
        THOUSANDS OF COMPUTER "BULLETIN BOARD" SYSTEMS TO PROSECUTE
        COMPUTER "HACKERS" WHO ARE ALLEGEDLY ABUSING CORPORATE AND
        GOVERNMENTAL COMPUTER SYSTEMS FROM COAST TO COAST.
           THE PROBLEM, TO THE EXTENT IT IS A PROBLEM, IS THIS:
        THOUSANDS OF COMPANIES, SCHOOLS, AND GOVERNMENT AGENCIES HAVE
        TELEPHONE HOOKUPS THROUGH WHICH THEIR CUSTOMERS AND EMPLOYES
        CAN CALL A CENTRAL COMPUTER TO GET INFORMATION OR LEAVE
        MESSAGES.
           A COMMON EXAMPLE OF SUCH A SYSTEM WOULD BE A NATIONAL
        RETAIL CHAIN WITH HEADQUARTERS IN NEW YORK CITY. THE CHAIN'S
        DUBUQUE STORE CAN CALL THE COMPUTER IN NEW YORK TO PLACE AN
        ORDER, CHECK ADVERTISING COPY, OR WHAT HAVE YOU.
           EACH SYSTEM HAS SOME SECURITY ARRANGEMENTS TO FEND OFF
        UNWANTED CALLERS. TO GET INTO THE WASHINGTON POST'S NEWSROOM
        COMPUTER, FOR EXAMPLE, YOU NEED TO KNOW THE PHONE NUMBER, AND
        THEN TYPE IN TWO SEPARATE PASSWORDS -- KNOWN ONLY TO THE USER
        -- BEFORE YOU CAN BE CONNECTED.
           THERE HAS BEEN A PROBLEM OF COMPUTER HACKERS AROUND THE
        COUNTRY TRYING TO PENETRATE SOME OF THESE CENTRAL SYSTEMS.
        SOME HACKERS EVIDENTLY DISCOVERED A NUMBER AND A PASSWORD TO
        GET INTO THE TACO BELL COMPUTER, PRESUMABLY ENABLING THE
        INTRUDER TO ORDER 5,000 CASES OF HOT SAUCE OR SOME SUCH.
           THE MOST INFAMOUS INSTANCE TO DATE CAME EARLIER THIS YEAR
        WHEN SOME HACKERS OBTAINED A NUMBER AND PASSWORD ENABLING
        THEM TO RUMMAGE AROUND IN THE ELECTRONIC RECORDS MAINTAINED
        BY TRW INFORMATION SERVICES, A BIG CREDIT AGENCY THAT HAD
        NAMES AND CREDIT NUMBERS OF SOME 90 MILLION PEOPLE.
           ALARMED BY SUCH HAPPENINGS, OUR BENIGHTED CONGRESSPEOPLE
        ROSE FROM THEIR COTS AND PASSED A LAW MAKING IT A FEDERAL
        OFFENSE -- WITH UP TO A YEAR IN JAIL FOR FIRST OFFENDERS --
        TO GAIN "UNAUTHORIZED ACCESS" TO ANY PRIVATE OR GOVERNMENTAL
        DATA BANK CONTAINING PERSONAL OR CORPORATE FINANCIAL RECORDS.
           THIS LAW IS A CLASSIC CASE OF SHOOTING AN ICBM AT A
        MOSQUITO -- AND FIRING WIDE. EVEN IF THE SITUATION WERE
        SERIOUS ENOUGH TO BRING ON THE G-MEN, THE STATUTORY SOLUTION
        CONGRESS HIT ON CANNOT WORK BECAUSE IT IS AIMED AT THE WRONG
        PEOPLE.
           GRANTED THERE ARE SOME BAD APPLES OUT THERE IN HACKERLAND.
        FOR THE MOST PART, THOUGH, THE PEOPLE MAKING THIS
        "UNAUTHORIZED ACCESS" ARE 15-YEAR-OLD COMPUTER "PHREAKS" WHO
        ARE DOING IT SOLELY FOR THE INTELLECTUAL CHALLENGE. IT'S A
        KIDS' GAME. BUT NOW CONGRESS IS DISPATCHING THE FBI TO TRACK
        DOWN THESE EVIL MISCREANTS AND SHIP THEM TO LEAVENWORTH.
           THE REAL PROBLEM WITH "UNAUTHORIZED ACCESS" IS NOT THIS
        CORPS OF PRECOCIOUS KIDS TYPING AWAY AT THEIR COMMODORES BUT
        RATHER THE CORPORATE COMPUTER TYPES WHO DESIGNED THE LEAKY
        CENTRAL SYSTEMS THE HACKERS ARE INVADING.
           IT IS NO GREAT TRICK TO SET UP A COMPUTER SYSTEM THAT
        CAN'T BE PENETRATED. IF YOU CREATE A SERIES OF PASSWORDS,
        PROTECT THEIR SECRECY, AND CHANGE THEM REGULARLY, YOU CAN
        FRUSTRATE JUST ABOUT ANY UNAUTHORIZED INTRUDER.
           MANY OF THE SYSTEMS OPERATING NOW, THOUGH, TREAT SECURITY
        AS A JOKE. TRW, FOR EXAMPLE, SAYS ITS CREDIT RECORDS ARE
        GUARDED AS CAREFULLY AS POSSIBLE. BUT INFOWORLD MAGAZINE
        REPORTED THAT A "SECRET" TRW PASSWORD MAY HAVE BEEN PRINTED
        ON CREDIT REPORTS ROUTINELY GIVEN TO PEOPLE APPLYING FOR A
        CREDIT CARD AT SEARS, AMONG OTHER PLACES. IT SAID THE SAME
        PASSWORD WAS PASSED AROUND FOR MONTHS, BUT THAT TRW DID NOT
        BOTHER TO ISSUE A NEW ONE.
           A GARDEN GROVE, CALIF., CONSUMER NAMED BURT MAZELOW HAS
        SUED TRW FOR FAILING TO PROTECT HIS CREDIT RECORDS FROM
        SNOOPERS. WITHOUT PREJUDGING THIS PARTICULAR CASE, ONE CAN
        SAY THAT MAZELOW HAS FOUND A MUCH MORE INTELLIGENT APPROACH
        TO THE PROBLEM THAN OUR SLEEPY SENATORS CAME UP WITH.
           IF THE PROBLEM OF "UNAUTHORIZED ACCESS" IS TO BE STOPPED,
        IT'S PATENTLY OBVIOUS THAT CHANGES WILL HAVE TO COME AT THE
        CENTRAL-COMPUTER LEVEL. INSTEAD OF HOUNDING RAMBUNCTIOUS KIDS
        GIVING THEIR COMPUTERS A WORKOUT, THE GOVERNMENT SHOULD
        ATTACK THIS PROBLEM AT THE SOURCE: THE CORPORATE AND
        GOVERNMENTAL BUREAUCRACIES THAT HAVE BEEN TOO DUMB OR TOO
        CHEAP TO MAKE SURE THAT PRIVATE INFORMATION IS REALLY
        PRIVATE.
/home/gen.uk/domains/wiki.gen.uk/public_html/data/pages/archive/news/hunt.txt · Last modified: 1999/08/01 17:09 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki