[621] in Intrusion Detection Systems
Re: Response to the computer criminal's introduction (FLAME WARNING)
daemon@ATHENA.MIT.EDU (Allwyn Crichlow)
Tue Feb 20 21:52:43 1996
From: Allwyn Crichlow <allwync@smooth.internic.net>
To: ids@uow.edu.au
Date: Thu, 15 Feb 1996 10:45:12 -0500 (EST)
In-Reply-To: <9602150040.AA10009@willow.c3i.saic.com> from "Ira S. Winkler" at F
Reply-To: ids@uow.edu.au
Hello All,
Ok, okay, we all know right from wrong(some?) let's move on.
I have no formal degree am I a hacker? I had to learn somehow, right?
So you say (YOU: "Well, did you break into systems to learn? If you did
shame on you") No I didn't, I'm fairly capable of learning and dealing with
increasingly sophisticated schemes and such without abusing them.
If you do wrong and luck up to and get a job thats fine and dandy.
My piont is...
Just being a Hacker doesn't make me or anybody else evil. Some in the press
have used the word "Hacker" as a word for "crimminal". Don't get caught
up with this guy or the PROBLEM sensationalized in the press, any REAL
security admin on this list can tell you it's alot worse!
The only advice I can say about anyone who wants to be notorious is
remeber they caught Dillinger(aka bank robber) we'll catch you! A Real
Hacker(my opinion) is a person that enjoys playing with computers at a
technical level.
Anyway...
I say let the former hacker share how he was caught(he seems not to mind
talking about it(not a flame))? Was it IDS loop holes he exploited?
How can I(the group) tamper proof? That's what others want to know on
the list. What can we learn from him is what should now be addressed?
He said he wanted to use/share his knowledge with us...the stage is yours;-)
Allwyn F Crichlow
Jr. Systems Adminstrator
InterNIC Registration Services
Felt like bragging... for the serious I will not do this again...
allwync@INTERNIC.NET
______________________
\~ _ _ ~/__ || _ .\ //////
\/ | | \// \| |_\ \ | o o |
|| |\\ \ /| . / ------o00----U----00o------
|: | \ \/ | *___/ | | | | | | | | | | | | | |
|__| \____|___\ | | | | | | | | | | | | | |
________________________________________________
/~ .~ / _ . ~/~ _ . |~ __ ~| _ . \~ _ _ ~/
// ____/_ |_\__/. | \__|. |__| | |_\__/\/ | | \/
/____ ~/ _|__|| | __|: _| _|__ || |
// . //: |_/. \: |_/. || |\ \\: |_/. \ |: |
/_____ /|________\______|__| \__\_______\ |__|
NIC HACKER
/* There three type of computer users in the world. */
/* Those who don't know what's happening. */
/* Those who wonder what's happening. */
/* And people like me that make things happen! */
/* Think Secure! */
>
> IMHO: Anyone that commits a crime, such as hacking, speeding, rape, etc.
> must be willing to accept the fact that there are repercussions to criminal
> actions. In the case of speeding, you might lose your insurance, your license
> or at least have your rates go up. Yes, I speed and I know that I will
> suffer if I get caught. Hackers tend not to consider the consequences, which
> include ostrization by the computing community. (I know I spelled it wrong.)
> [ostracization - RuF]
>
> Whether people consider it right or wrong, that is the long term consequence
> of hacking. Additionally, corporate share holders could hold a company liable
> if a "reformed" hacker turned out to be not so reformed.
>
> As for someone saying that they should be hired for security work because they
> demonstrated their skill by acquiring a criminal record as opposed to a
> degree, that is ludicrous. I know plenty of people without criminal records
> that have the same skills, and better. Depending upon the responses to these
> comments, I will provide more input later.
>
> Ira
>