We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 4
9115723, 10:36 PM Computer Criminals | Secury in Computing, Third Editon
1.4, Computer Criminals
In television and film westerns, the bad guys always wore shabby clothes,
had mean and sinister looks, and lived in gangs somewhere out of town.
By contrast, the sheriff dressed well, stood proud and tall, was known and
respected by everyone in town, and struck fear in the hearts of most
criminals.
To be sure, some computer criminals are mean and sinister types. But
many more wear business suits, have university degrees, and appear to
be pillars of their communities. Some are high school or university stu-
dents. Others are middle-aged business executives. Some are mentally de-
ranged, overtly hostile, or extremely committed to a cause, and they at-
tack computers as a symbol. Others are ordinary people tempted by per-
sonal profit, revenge, challenge, advancement, or job security. No single
profile captures the characteristics of a “typical” computer criminal, and
many who fit the profile are not criminals at all,
Sidebar 1-4 Hollywood at Risk
Do you think only banks, government sites, and universities
are targets? Consider Hollywood.
In 2001 Hollywood—specifically the motion picture industry—
was hit with a series of attacks, Crackers entered computers
and were able to obtain access to scripts for new projects, and
digital versions of films in production, including Ocean's 11 at
Warner Brothers and The One at Columbia Pictures. The at-
tackers also retrieved and made public executives’ e-mail
messages.
But, as is true of many computer security incidents, at least
one attacker was an insider. Global Network Security Services,
a security consulting firm hired by several Hollywood compa-
nies to test the security of their networks, found that an em-
-ntps:!tearing rely comiibraryiview!secutt r-computingl0130356488/0130355488_chOtlevtsoca ml ua‘1182, 1036 °m ‘Computer Gmina | Secuty in Computing, Tied Eton
ployee was copying the day's (digital) film, taking it home, and
allowing his roommate to post it to an Internet site.
Whatever their characteristics and motivations, computer criminals have
access to enormous amounts of hardware, software, and data; they have
the potential to cripple much of effective business and government
throughout the world. In a sense, then, the purpose of computer security
is to prevent these criminals from doing damage.
For the purposes of studying computer security, we say computer crime is
any crime involving a computer or aided by the use of one. Although this
definition is admittedly pretty broad, it allows us to consider ways to pro-
tect ourselves, our businesses, and our communities against those who
use computers maliciously.
The US. Federal Bureau of Investigation regularly reports uniform crime
statistics. The data do not separate computer crime from crime of other
sorts. Moreover, many companies do not report computer crime at all,
perhaps because they fear damage to their reputation, they are ashamed
to have allowed their systems to be compromised, or they have agreed
not to prosecute if the criminal will “go away.” These conditions make it
difficult for us to estimate the economic losses we suffer as a result of
computer crime; our dollar estimates are really only vague suspicions.
Still, the estimates, ranging from $300 million to $500 billion per year, tell
us that it is important for us to pay attention to computer crime and to try
to prevent it or at least to moderate its effects.
One approach to prevention or moderation is to understand who com-
mits these crimes and why. Many studies have attempted to determine
the characteristics of computer criminals. By studying those who have al-
ready used computers to commit crimes, we may be able in future to spot
likely criminals and prevent the crimes from occurring, In this section,
‘we examine some of these characteris
-ntps:!tearing rely comiibraryiview!secutt r-computingl0130356488/0130355488_chOtlevtsoca ml 269115723, 10:36 PM Computer Criminals | Secury in Computing, Third Editon
Amateurs
Amateurs have committed most of the computer crimes reported to date.
Most embezzlers are not career criminals but rather are normal people
who observe a weakness in a security system that allows them to access
cash or other valuables. In the same sense, most computer criminals are
ordinary computer professionals or users doing their jobs, when they dis-
cover they have access to something valuable.
When no one objects, the amateur may start using the computer at work
to write letters, maintain soccer league team standings, or do accounting.
This apparently innocent time-stealing may expand until the employee is
pursuing a business in accounting, stock portfolio management, or desk-
top publishing on the side, using the employer's computing facilities
Alternatively, amateurs may become disgruntled over some negative
work situation (such as a reprimand or denial of promotion) and vow to
“get even” with management by wreaking havoc on a computing
installation.
Crackers
System crackers,t2] often high school or university students, attempt to ac-
cess computing facilities for which they have not been authorized.
Cracking a computer's defenses is seen as the ultimate victimless crime.
The perception is that nobody is hurt or even endangered by a little
stolen machine time, Crackers enjoy the simple challenge of trying to log
in, just to see whether it can be done. Most crackers can do their harm
without confronting anybody, not even making a sound. In the absence of
explicit warnings not to trespass in a system, crackers infer that access is
permitted. An underground network of hackers helps pass along secrets
of success; as with a jigsaw puzzle, a few isolated pieces joined together
may produce a large effect. Others attack for curiosity, personal gain, or
self-satisfaction. And still others enjoy causing chaos, loss, or harm. There
is no common profile or motivation for these attackers.
-ntps:!tearing rely comiibraryiview!secutt r-computingl0130356488/0130355488_chOtlevtsoca ml 3‘1182, 1036 °m ‘Computer Gmina | Secuty in Computing, Tied Eton
{21 The security community distinguishes between a “hacker,” some-
one who (nonmaliciously) programs, manages, or uses computing
systems, and a “cracker,” someone who attempts access to comput-
ing systems for malicious purposes. Crackers are the “evildoers.”
Now, hacker has come to be used outside security to mean both be-
nign and malicious users.
Career Criminals
By contrast, the career computer criminal understands the targets of
computer crime. Criminals seldom change fields from arson, murder, or
auto theft to computing; more often, criminals begin as computer profes-
sionals who engage in computer crime, finding the prospects and payoff,
good. There is some evidence that organized crime and international
groups are engaging in computer crime. Recently, electronic spies and in-
formation brokers have begun to recognize that trading in companies’ or
individuals’ secrets can be lucrative.
As mentioned earlier, some companies are reticent to prosecute com-
puter criminals. In fact, after having discovered a computer crime, the
companies are often thankful if the criminal quietly resigns. In other
cases, the company is (understandably) more concerned about protecting
its assets and so it closes down an attacked system rather than gathering
evidence that could lead to identification and conviction of the criminal.
The criminal is then free to continue the same illegal pattern with an-
other company.
-ntps:!tearing rely comiibraryiview!secutt r-computingl0130356488/0130355488_chOtlevtsoca ml 4