[568] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Re: Response to the computer criminal's introduction (FLAME WARNING)

daemon@ATHENA.MIT.EDU (Chris)
Fri Feb 9 13:55:05 1996

Date: Wed, 7 Feb 1996 16:51:40 -0800 (PST)
From: Chris <chris@bison.RANGE.ORST.EDU>
To: ids@uow.edu.au
In-Reply-To: <9602061143.AA25006@all.net>
Reply-To: ids@uow.edu.au

Ok, this isn't a flame, but is a response.

On Tue, 6 Feb 1996 owner-ids@uow.edu.au wrote:

> I feel that someone must respond to this introduction.  If you don't
> like highly inflamatory postings, delete this now without reading it. 
> 
> > Since i cannot do anymore hacking without facing the risk to
> > go back in jail.. I thought i could use my skills in the
> > computer security community. 
> 
> It is my opinion that anybody who would hire a computer criminal to work
> on computer security deserves to lose all of their information assets -
> and probably will.  It's about as smart as hiring a convicted child sex
> offender to run a daycare center.
> 

Many companies employ this practice, actually. It is my understanding 
that several government agencies, companies, etc.. employ so called 
"criminals" to assist in securing their network, or rather, in finding 
holes in a security scheme once they believe they have secured their 
network. There are a lot of 'hackers' out there, and most of them do not 
get caught. Do you believe that 'hackers' (hacker in this sense meaning 
someone who is knowledgable on topics of and related to computer, 
telecom, etc... security, using such practice to break into computer 
networks and the like) period should not be working with commercial 
computer security?

I think many companies realize the value of having the 'enemy' helping 
them so that someone who has more harmful intentions does not do them 
harm. If you do not employ these people, you are employing people who 
learned all that they know from textbooks, manuals, seminars, and 
schooling. The edge that a 'hacker' may give could include contacts for 
information, an in-depth view of how those that may attempt to enter your 
system would get into it, or at least try to get into it, and perhaps 
most of all, a 'hacker' would probably have a drive. A curiousity. An 
intense desire to find not only bugs in your system that most would use, 
but those system flaws that are original and new, that the one harmful 
person to your organization might try out. 

If someone were hired in a corporate espionage context, chances are the 
person would have a well set-up computing platform, all the requisite 
software to make the job of hacking easier, and that intense desire to 
get in. 

After all, securing your network is really just trying to figure out how 
others would try to get in. It's amazing how many companies I see that 
>secure their networks and don't bother trying to break into them, themselves.

Anyways, this is my two cents and attempt to start up a discussion on the 
value of hackers and 'criminals' in securing a network in the 
datacom/telecom context.

> > I am also working on an unix intrusion detector based on new
> > concepts.. and will open a computer security company during the 
> > year.
> 
> Please let us know the name of the company when you start it so we can
> tell all of our clients to avoid it.

You may still be interested in his intrusion detector, even if you didn't 
like the company, if the company starts, that is. I don't know him, or 
that product or company he is trying to start creating, but from a 
security context, I use all the tools at my disposal to secure the 
networks that I secure.

> ************** FLAME OFF ***************** 
> 
> -> See: Info-Sec Heaven at URL http://all.net/
> Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236

-Chris (chris@bison.range.orst.edu)

home help back first fref pref prev next nref lref last post