Next: 2.3 The System Administrator
Up: 2. The SysHackAdminer
Previous: 2.1 Ethics
Subsections
hacker, n: One with axe and intends to use it
A hacker is one who is ``intensely interested in the arcane and recondite workings
of any computer operating system''[2]. A cracker on the other hand is
defined as one who ``breaks into or otherwise violates the system integrity
of remote machines, with malicious intent''[2]. From these definitions,
it should be clear that what seems to separate a hacker and a cracker the most
is malicious intent. Although malicious intent is not the only difference
between a hacker and cracker, it provides at least one method of differentiating
a hacker and cracker.
Using this test, the difference between hacker and cracker is not based on any
laws but on the state of mind of the person. The test is based on Mens
Rea which refers to the guilty mind. It describes the mental condition in which
criminal intent exists[2]. Using this test, it is very simple to differentiate
between the hacker and the cracker. An action that any law-abiding citizen would
have employed in that situation is acceptable because there is no mens
rea. A real life example to illustrate how this test works is a security guard.
He may check that every door is closed and locked to establish the security
of the building. A thief on the other hand performs the same action but his
motive is to steal, mens rea, and that makes the action a crime.
Although the correct term to speak of today's security breakers is ``cracker'',
it is not widely used. The media and the general public refer to them as hackers,
and not crackers. Indeed, they refer to themselves as hackers. It is for these
reasons that we shall refer to security breakers as hackers2.1 instead of crackers.
Morris started as an old-school-hacker and ended up somewhat closer to a cracker.
He is convicted of having written and deployed the WORM program that terrorized
the Internet (then ARPANET). His defenders claim that his action was a demonstration
of the weaknesses of security systems. They argue that the WORM put a point
about security across to the security community more effectively than telling
them would have done. The security community obviously did not appreciate the
point, for Morris was arrested and convicted of a criminal offense. We discussed
Mens Rea, and looking at the WORM program itself, it looks as if there
was criminal intent. His intentions seem not to have been a direct attack against
ARPANET itself. He did however have every intention of breaking into all those
machines, for one reason or another. For more information on the WORM incident
and Morris, see [9],[20] and [27].
Security is immoral, information WANTS to be free.
Chapman and Zwicky, in [6], group hackers into different categories. The
categorization is based on the reasons for the intrusion and the intruders'
actions when access is obtained. The categories Chapman and Zwicky have come
up with are:
- 1.
- Joyriders
- 2.
- Vandals
- 3.
- Score Keepers and
- 4.
- Spies.
We have added tiger teams to this list of hacker categories for reasons explained
later. We now continue to describe all the hacker types in more detail.
- Joyriders
- break into computer systems for fun. They are probably the safest
type of hackers to have break into your computer system. They are not out to
damage anything although they sometimes do when trying to cover their tracks,
learn something new or when they simply make a mistake. They are probably the
closest that modern day hackers get to the original ones; they are in pursuit
of knowledge. Today's ``script kiddies'' fall mostly into this category.
- Vandals
- break in with criminal intent. There really is no way to overlook the
mens rea. They break in either because they do not like you or just because
they enjoy doing that kind of thing. They are probably the most dangerous of
all hackers. It is also hard to identify who is not liked and therefore who
will be attacked.
- Score Keepers
- break in just to brag about it. Most if not all hackers have
traits from this group. For acceptance or respect on the computer underground,
they have to have ``ears'' on their belt. To these hackers, well-known, respected,
secure and ``feared'' sites like the US Military and NASA are particularly
attractive. Unlike joyriders, they go from machine to machine trying to break
into as many systems as they can. That leads to another way that they can be
noticed, when an administrator from another network complains about hacking
attempts from your network.
- Spies
- break in to get information; to steal information. They usually steal
things that they can use or sell for money e.g. credit card numbers. They are
the hardest type of hackers to catch since they usually do not disturb anything.
They get in, copy information, and leave without changing or removing anything.
They may not use that break-in method again and almost never use the same access
method to break into somewhere else. That is the point of stealing information.
Usually the first choices for target are Internet Service Providers (ISPs) and
Telephone companies. Stealing passwords for dial-up accounts means the hacker
never pays for the Internet connectivity. Breaking into the phone company means
that he won't be paying for the call to the ISP either. If yours is a company
relying on preserving a competitive edge by the information you keep, you will
probably hate these hackers about as much as you will hate vandals. One of the
most publicised stories of these types of hackers is described in [30].
- Tiger Teams
- do not belong here but are included for a reason. There is much
debate about what they actually are. What is certain however, is what
they were. Tiger teams are groups of people employed by companies to
probe the security of hosts belonging to that company. This allows the company
to keep ``ahead'' of the hackers because holes can be patched before the hackers
break in. It should now be apparent why tiger teams do not belong here - they
are law-abiding citizens with a knowledge of security issues and therefore a
countermeasure against hackers. It is important to note that some of the members
of tiger teams are hackers, some even convicted. These days, some refer to a
group of spies hired by a competing company to steal information from the competition
as tiger teams. Hence their inclusion in this section.
2.2.3 Hacker Ethics
Most hackers claim to adhere to a Hacker Ethic when they hack. These
hackers are said to be the ``real'' hackers of today because they are principled
and never damage anything. Steven Levy's book, ``Hackers: Heroes of the Computer
Revolution'', came up with six tenets currently regarded as the hacker ethic:
- 1.
- Access to computers should be unlimited and total
- 2.
- All information should be free
- 3.
- Mistrust authority - promote decentralization
- 4.
- Hackers should be judged by their hacking, not bogus criteria such as degrees,
age, race or position
- 5.
- One can create art and beauty on a computer
- 6.
- Computers can change your life for the better[18].
As argued by Spafford in [26], at least two parts of the ``hacker ethic''
are flawed. It should be noted too, that the hackers that Levy was writing about
were the original law-abiding hackers. The ideas he expressed were adopted by
the currentday hackers to justify their illegal hacking and to get up to the
level of the original and real hackers. It should also be noted that not everyone
who breaks into computer systems shares these views. The fact that there are
some hackers out there who do not subscribe to these ideas seems reason enough
not to trust hackers. At the very least, it is reason enough to not trust anyone
you do not know personally and whose necks you cannot snap in real life.
Spafford has published extensively. He is also the co-author of the book Practical
Unix Security[12]. He wrote a paper [26] in which he evaluated
the moral implications of computer break-ins. In this paper, he concludes that
the act in itself is immoral. He extends this idea to say that when not breaking
in would cause ``a greater wrong'', then the act is allowed.
In his paper he refutes some of the reasons hacker give for hacking. We shall
now take a deeper look at two of these reasons, with the reasons he uses to
claim that they are not moral. We shall also consider counter arguments to his
belief. The interested reader can read more on the Spafford's arguments in [26].
The two arguments of his we consider are :
- The Hacker Ethic
- claims in part that all information should be free (see 2.2.3).
From this it follows that intellectual property doesn't exist and there is no
need for security. He argues that privacy is not a possibility with this view,
neither is accuracy of information. He continues to include economic arguments
to point out that such a view is naive and unrealistic.
- The Security Argument
- claims that break-ins illustrate security problems to
a community that would otherwise not listen. This argument is the used most
by the people who defend Robert T. Morris, the author of the WORM program. Spafford
goes on to add that Morris was respected in the security community. Therefore,
if Morris had spoken about the bug he exploited in sendmail, Spafford claims
the community would have listened. The security community had listened when
he announced an FTP vulnerability. Spafford adds that people saying people who
break into computers are performing a service for which they should be commended
is as ridiculous as saying vigilantes have the right to break into homes to
demonstrate how susceptible to burglars they are.
He points out that not every site has resources to install the newest, greatest
and most secure software. The other side of the coin is that if they cannot
fix their problems, they need to find other ways to protect their sensitive
information. It boils down to what is more important. If your information is
the lifeline of your organization, you will pour a lot of resources into protecting
that lifeline. Going on, Spafford claims to know of sites that were taken off
the Internet because of the threats posed. He claims that is a high price to
pay for a claimed ``favour''. Taking mission critical machines off a publicly
accessible network is just what Richard Stallman advocates[28]. Stallman
believes that if one has information that needs to be kept secret, one needs
to make sure it is unreachable.
In section 2.2.2, we introduced tiger teams. We also noted that tiger teams
did not belong in the aforementioned section since they are/were law-abiding
citizens. We also noted that some members of tiger teams have been known to
be convicted hackers. He is adamant that it is ridiculous to employ a hacker,
especially convicted, to secure your network. He believes that hiring a hacker
would be like ``hiring a known arsonist to install a fire alarm. Just because
he knows how to set a fire doesn't mean he knows how to extinguish one''[8].
While in a way Spafford is justified in being reluctant to hire hackers, his
analogy does not do them justice. Hackers happen to know a lot about computer
security and even if they do not patch the holes up themselves, they can point
them out. When a hacker is helping you protect your system, you have the added
advantage of knowing how the hacker thinks, and therefore how other hackers
are likely to think. To claim that hackers are bad, fullstop, and that there
remains no use for them is to send them back to what they know, which we will
then condemn. While we agree that one has to be very careful if one intends
to hire a hacker to improve system security, we do not agree with a blanket
``no hackers''. To effectively protect against hackers, one must have a working
knowledge of how hackers think.
The answer to the question posed above is one that has to come from each individual
concerned with security. There are pros and there are cons to hiring hackers.
To give an answer here would make us responsible for bad choices on which hackers
to employ, if a decision is taken to employ a hacker, a responsibility we do
not want. If the reader is worried about security and cannot afford to take
the risk hiring a hacker, then he is advised to go Spafford's route; it is the
safest. However, if this document accomplishes what it sets out to accomplish,
the reader should neither have to ask nor answer the question posed above.
Next: 2.3 The System Administrator
Up: 2. The SysHackAdminer
Previous: 2.1 Ethics
Shaun Bangay
1998-11-19