® InfoJur.ccj.ufsc.br
Why Kids Shouldn't be Criminal Hackers

by M. E. Kabay, PhD, CISSP

Director of Education

ICSA, Inc.

At some time in your career as users of computers, someone is going to tell you how much fun it is to hack into computer systems and networks. I'm here to tell you it's a bad idea. I'd like you to understand what happens on the other side of that modem -- on the other side of that Internet connection -- when someone uses a computer system without permission.

Let me tell you a little about myself first. Strange as it may seem, I was once a kid. Admittedly, I was a pretty strange kid, but then so are many criminal hackers. I began programming computers when I was 15. That's probably around the time some of your parents were born--it was 1965. At that time, computers were pretty much as big as a house, needed enormous power cables to supply all the electricity, needed enormous air-conditioning units to carry all the heat away, and could serve one user at a time. We used to program these monstrous computers--computers that had not much more power than a hand-held programmable calculator today--using punch cards. It was pretty hard to gain unauthorized access to computers back them because he they were locked up. The only way you got to program the computer was to hand in your cards through a window into this big room. If the technicians knew you or if you could show them your identification, they would feed your cards into the computer. Whenever you finished running your program, it would disappear from the inside of the computer--the memory--and someone else's program would be loaded.

Giving your name to the technician was a form of identification. Identification means telling who you are. The next step was authentication. Authentication means proving that you are who you say you are. Showing your ID card from your school or from your employer is a form of authentication because it represents something that only you are supposed to own. When your parents enter their bank-card into the automatic teller machine, that card is their identification. When your parents punch in their personal identification number (PIN), they are authenticating themselves.

Identification and authentication are very important in today's computer systems, but we do it differently now. Instead of speaking to a technician, now we usually type in a user-ID and give a password that no one else is supposed to know. Sometimes modern computers use other forms of identification and authentication; for instance, some computers look at your fingerprints, the shape of your hand, your eyes (retinas and irises), or your face and identify and authenticate you that way. Some computer systems recognize your voice or your handwriting and they identify and authenticate you that way. Other computer systems read a special card that has a little computer -- a microchip -- in it and that belongs only to you.

Well anyway, back in the 1960s and 1970s, computers and communications continued to evolve. Computers began to allow several people--sometimes hundreds of people--to use them all at the same time. It also became possible to communicate with computers from much further away than in the old days. The development of modems meant that you could communicate with a computer from many miles away by using the phone system.

Well, that kind of access meant that it was possible to get into computer systems without permission. For example, people could find out your user-ID and password and pretend to be you--after all, there was no technician to check to see if it really was you. Many computers back then had tight limits on how many hours of use you had on the computer every month, so someone who used your user-ID was in a way stealing computer time. If the person did not know your password, sometimes they would guess over and over; if you had a password that was easy to guess -- if it were really short, or was maybe your own name, or your dog's name, or your favorite sports team -- it could be pretty easy to guess. These people who used the computer in your name were among the earliest criminal hackers.

What do we mean by criminal hacking? Basically it means using a computer without the permission of the owners.

To understand why a using a computer system without permission causes problems, you have to understand the basic goals of information security. There are six different aspects of information that needs protection. Let's look at these one by one. The six principals are as follows: confidentiality, control, integrity, authenticity, availability, and finally usability. Let's look at these one by one.

Security experts talk about confidentiality. Confidentiality refers to limits on who can get what kind of information. For example, you might want to keep it secret that you have a crush on the child who sits in front of you! If someone were to find that out and tell other people, that would be a breach of confidentiality. If somebody were to find out your parents' bank account number and their secret number (the PIN, or Personal Identification Number) that they use at the banking machine, that would be a breach of confidentiality.

Another kind of protection for information is the preservation of control. As an example, imagine what would happen if somebody told your parents that they had taken a video film showing exactly what buttons your parents pushed when entering their bank-card PINs -- but that everything was OK because no one had looked at the video yet. Your parents would be frantic. They would be worried because they would no longer have control over their own secret number and over their own bank accounts. Something very similar--a loss of control--is what would occur if a stranger broke into your house when everyone was away. Even if they didn't do anything, you would still feel comfortable. You wouldn't know if maybe the strangers did something bad to your food. You might want a throw food away just in case. You might feel uncomfortable because maybe the strangers looked in your diary. These would all be indications of a breach of control.

Security people next consider the issue of integrity. Integrity refers to being correct. For example imagine how bad you would be if somebody took one of your exam papers and change it so that your answers were now wrong. This would be a breach of integrity. If someone were to take a check that your parents wrote and then changed the amount payable, that would be a breach of integrity. Changing information without permission is a breach of integrity.

There have been cases where criminals have altered medical data. Changing medical records can lead to very dangerous situations for the patients. Some criminal hackers have played around in school records. They changed grades that were recorded by teachers. Now of course, this may sound funny, but it stops being funny when you think about what would happen if somebody changed your grades and made them worse. Unauthorized modification of data is a breach of integrity.

Another principle of security is authenticity. Authenticity means that information should be labeled correctly. For example sometimes a criminal hacker sends electronic mail in somebody else's name. In one case, a professor in a Texas university found that someone had broken into his e-mail account. The hacker sent out two thousand e-mail messages in the professor's name. These e-mail messages were full of hateful, racist language and therefore some of the people who got the messages became very angry with the professor. This was not fair, because the professor didn't write the messages. However, he and his family received death threats and had to be put under police protection because people threatened to burn their house down. This was an example of a breach of authenticity. You might want to think about how embarrassing it would be if someone were to send e-mail messages in your name that said things you didn't agree with. Suppose someone were to insult your teachers by sending them messages signed with your name. You might get into a lot of trouble even though you had not done anything wrong. Protecting authenticity is one of the reasons that you must never reveal your password to anyone else. You have to protect the authenticity of your communications.

This fifth principle of information security is preservation of availability. Availability means having timely access to information. Timely access refers to getting hold of the information you need when you need it. For example, suppose you have to write an essay on the novel, The Wind in the Willows. You want to read the novel before you write the essay. If someone hides all the copies of the novel at the library and at the bookstores, you can't read the novel in time for your essay. That would be a breach of availability of that novel.

One of the most serious and widespread problems in today's computers is called denial of service. Denial of service can occur when someone overloads a computer system or network with bogus requests. One bad case of denial of service occurred when some nut who called himself Johnny [x]Chaotic subscribed dozens of people to huundreds of e-mail lists. These poor people began receiving e-mail on basket weaving, engineering, plumbing -- you name it. One writer received 20,000 e-mail messages in a single day. Imagine trying to find your own e-mail messages if someone sent you twenty thousand messages you did not want. It would take hours just to read through the subject lines to find the e-mail you wanted. That would be a denial of service. Denial of service is a breach of availability.

Finally, the last principle of information security is utility. Utility means usefulness. For example, if you went to the local store and all of the prices were in Norwegian Kroner but nobody knew how many Kroner there were in the dollar, that would not be very useful to you.

Now that you have some idea of what information security people worry about, it's pretty easy to understand why breaking into somebody's computer system is really bad.

Of course the obvious problems concern confidentiality, integrity and authenticity.

Anyone can see that going into a computer system and reading other people's documents, other people's e-mail--or even information relating to national security in military computers--all of these breaches of confidentiality are a real problem.

Changing accounting records, stealing money by making false bank transfers, altering prescriptions so the people can become sick, sending out bad the email other people's names--these breaches of integrity and authenticity or all so obviously bad.

One of the most popular forms of criminal hacking is Web vandalism: damaging Web sites by substituting often obscene pictures and offensive text for the original materials. The CIA was renamed the Central Stupidity Agency; the Florida Supreme Court's Web page was turned into an illustrated sex-manual--you get the idea. The people are usually children or young teenagers. These cybervandals are just like the punks who throw rocks through people's windows or who spray-paint curses and foul words on buildings to express their rage and rebellion. They're bored, childish nuisances.

The really tricky problem is that criminal hackers always claim that if they don't alter information, they haven't done anything wrong--or at least, they haven't done anything really wrong, as they say. This point of view is simply, flatly wrong.

The fundamental problem caused by unauthorized access to information systems is loss of control. Let me explain what really happens when some punk breaks into a computer system.

First you have to understand that many people depend on computer systems to get their work done. The computer systems they depend on are known as production systems. For example the local banks need to have computers process their checks so that people can get paid and so that the right amounts can be taken out of the employer bank accounts and deposited in the employee bank accounts. What do you think happens in the bank if someone breaks into their computer system? I'll tell you: it's a real mess.

The poor bank employees don't know whether the intruders have damaged some of their bank records or programs. Even if the criminal hackers leave a note (you know, "W3 D1DN'7 DO 4NY7H1NG WR0NG C4USE W3R3 313373" using that code of theirs), how do the employees really know if everything's still OK or whether the hackers have damaged something?

The only thing to do is to check. Security experts say that such a system is no longer trusted. The employees have to reestablish trust in the data and also in the programs. Criminal hackers have been known to insert their own changes to certain computer programs. Criminal hackers often leave what are called back doors into the systems they've already broken into. Back doors allow the hackers to re-enter the compromised computer systems anytime they want. This kind of change to system software is a real threat to the people that have been victimized. It can take days to check all of the information on a computer system that has been broken into. Sometimes the checking costs hundreds of thousands of dollars in wasted salary or consulting fees.

I remember that when I was in charge of a big computer center in the 1980, my staff and I would spend from midnight to 6 in the morning every day for five days testing the new version of the computer operating system that the computer maker had sent to us. If we were willing to spend five nights testing the manufacturer's software, doesn't that tell you how important trust was for us? Now think about why on earth we would trust a production system that might have been damaged by a criminal hacker. It wouldn't make sense. We have to check the system after every intrusion. So that's why it's not true that breaking into computer systems is harmless fun.

I hope you will think about this the next time someone suggests that you play with them by breaking into somebody's computer system. Try to tell them this isn't a videogame. Hacking computers hurts real people. The victims of hacking spend sleepless nights away from their families working hard to see if their computer systems have been damaged by intruders. They worry about it. If there has been damage, it can cost lot of money to fix the data and the programs. This money lowers profits for companies or increases costs for nonprofit organizations.

If the criminal hackers laugh at the costs and tell you that "it's only a company -- it's not real people" then you will know that they are either stupid or they are deliberately lying to you. Organizations are made of real people. Real people lose because of criminal hacking.

On another level, some people get caught when they hack, and their reputation for dishonesty can follow them for many years. I have met young people who didn't think they were doing anything wrong but who discovered how hard it is to be accepted at universities were to get good jobs when they have shown themselves to be sneaky criminals who obviously did not care about the people that they hurt. If these people continue hacking past their eighteenth birthday, they can go to jail for unauthorized access to some kinds of computers.

There are many ways to learn about computing. It is not necessary to become a criminal in order to learn. Enjoy computers and respect your fellow human beings while you enjoy this wonderful new world of cyberspace.


You are welcome to write to me. Send e-mail to mkabay@compuserve.com with your comments and questions.



Retirado do site: http://www.icsa.net/library/research/criminal.shtml em jul/99