You are not logged in. Login Now
 0-24   25-49   50-74   52-76   77-101   102-126   127-145    
 
Author Message
25 new of 145 responses total.
bobcat
response 77 of 145: Mark Unseen   Oct 2 07:19 UTC 2000

There's a few problems that occur in cases of this type:
Teenage geeks should not be put in prison for stupid computer tricks.
But they are with alarming frequency.
The DAMAGE done in these cases is often wildly overstated: Kevin Mitnick was
charged with doing $300,000,000 of damage - total nonsense.
The costs to FIX the damage are overstated and not germane to the case:
Let's assume there was a current tape backup of m-net.
The sysop reloads the system - poof! - and it's back to how it was before the
damage occurred. How much time is involved in typing a few lines to do that?
The proper punishment would be to make the VANDAL do something of service to
the community, like pick up trash for afew hours.
Time the system gods spend upgrading security is time they would have spent
ANYWAY, it's not because of the VANDAL, it's because it is a good and kindly
thing to do.
IRL, if you have no lock on your door, and someone walks in and steals your
frammistat, you can sue him to recover it (or its cost), but you'll never
prevail on the court to award you money to buy a lock.
But it seems that cyberdoors are treated differently in the current digital
red scare climate.
scott
response 78 of 145: Mark Unseen   Oct 2 11:27 UTC 2000

The trouble with just "poof" doing a tape restore is that staff had no idea
how long root had been compromised.  So how far back does it make sense to
restore, versus a clean start with a  known non-compromised fresh install?
md
response 79 of 145: Mark Unseen   Oct 2 12:12 UTC 2000

Mnet is indeed "grossly negligible," but I don't think they know it and 
I certainly don't think it's a crime.
jazz
response 80 of 145: Mark Unseen   Oct 2 14:25 UTC 2000

        The time to repair isn't really relevant.  If you start a fire in a
warehouse and the warehouse puts out the fire because it was properly equipped
with a fire extinguishing system, it's still arson.  But in this case, it was
about a month of volunteer and unpaid effort.
polygon
response 81 of 145: Mark Unseen   Oct 2 14:53 UTC 2000

Re 79.  Heh!
scg
response 82 of 145: Mark Unseen   Oct 2 16:50 UTC 2000

Could somebody please explain to me the rationale under which the amount of
time requred to fix something that's been vandalized, or at least the amount
of time it could be reasonably expected to take, shouldn't be considered in
figuring out the amount of damage incurred?  In that case, how do you measure
the cost of damage?
mdw
response 83 of 145: Mark Unseen   Oct 2 17:30 UTC 2000

The problem with fixing vandal damage is not the same as the problem of
cleaning up after a regular disk disaster.  If it were just a failing
drive then, yes, restoring the last good backup is a fine strategy.  For
a vandal, however, it's *much* harder, because not only do you not
necessarily know when they broke in, but for the data they didn't tamper
with, you'd generally want to restore the newest data, even if it's
after the vandal broke in.  Even more importantly, you need to figure
out *how* the vandal broke in, or otherwise take effective steps to make
sure the vandal can't break in again, perhaps coupled with additional
logging stuff so that you can (hopefully) detect another break-in
attempt before they succeed.  There may be other less direct problems -
for instance, if the vandal stole user passwords (a common ploy) you may
need to worry about resetting user passwords, and users may have to not
only worry about getting a new password on m-net, they may also need to
change their passwords elsewhere.  (This is one reason why it's a bad
idea to use the same password in more than one place.) A lot of these
problems (figuring out what the vandal did/stole, dealing with possible
stolen passwords, etc.) are issues that don't arise with a simple
security upgrade.
bdh3
response 84 of 145: Mark Unseen   Oct 3 04:22 UTC 2000

Look, I've never met the dude who broke root, never even seen any posts
and don't even know his login.  But I do know he is 17 years old and
(somebody feel free to correct me) he did no actual damage.  (He didn't
even change the menu shell so is prompted "Want Cookie" and responded
"No!  Want Cookie" and refused to go further unless the user typed
'Cookie'...)

I do know that he's gonna have a hard time going to college and/or
getting a job from now on.  "Have you ever been arrested/convicted
for/of a felony" is the usual form of the question on the application.
How sad, and for what...
bobcat
response 85 of 145: Mark Unseen   Oct 3 05:42 UTC 2000

jazz, you're saying it took one month to restore the system to its
uncompromised state? This is an important point ad far as the proper
punishment is concerned.
Also, regarding volunteer effort's value: the IRS says it has none.
If I do 10 hours of work for the Red Cross, and do not charge them the $1000
I could have earned elsewhere, I certainly can;t deduct it from my taxes as
a contribution. You CAN deduct expenes involved in travel, etc.
As for restoring a system before the point it was compromised: you can never
really be sure it wasn't done long ago, and this VANDAL just spotted the
opening. The only thing you can do (which you would have done eventually
anyway) is secure the system NOW and restore any data lost. Everyone is of
course responsible for their own password, and the staff passwords would all
be reset by the person fixing the system. Free users need to change their own,
and are responsible for their OWN backups. Ordinary user's passwords are not
a big deal for the sysops, as they have no extraordinary privileges. You use
a free system at your own risk.
bdh3
response 86 of 145: Mark Unseen   Oct 3 07:28 UTC 2000

And a responsible system would have been running 'tripwire' to note
exactly when and what critical system files were modified, detected same
when it happened and easy to correct.  A truely less than stupid system
would have been monitoring any number of 'Net sites to fix security
holes before a '17-year old' script kiddy coulda even gotten in.
jerryr
response 87 of 145: Mark Unseen   Oct 3 13:47 UTC 2000

don't you get tired of having sand in your ears?
jazz
response 88 of 145: Mark Unseen   Oct 3 14:22 UTC 2000

        I can't think of a way to encourage volunteers to spend all of their
free time monitoring rootshell and bugtraq for the patches to all of the
problems that crop up, the way some script kiddies do, Beady.  Can you?  
jp2
response 89 of 145: Mark Unseen   Oct 3 14:23 UTC 2000

This response has been erased.

jazz
response 90 of 145: Mark Unseen   Oct 3 14:29 UTC 2000

        Uhm, he really didn't mention anything other than that the physical
hardware wasn't damaged, and that the intruder hopscotched to UofMd.
jerryr
response 91 of 145: Mark Unseen   Oct 3 16:41 UTC 2000

alllrighty then.  no, i'm not going to give you any details.  they may or may
not ever see the light of day depending on what happens in court.

but, hey, why would anyone want to listen to jamie and me?  knock yourselves
out.  i'm done.
jazz
response 92 of 145: Mark Unseen   Oct 3 17:34 UTC 2000

        It just might have something to do with attitudes like "all you dumb
mother fuckers".
brighn
response 93 of 145: Mark Unseen   Oct 3 18:01 UTC 2000

Did #91 smack vaguely of obstruction of justice via witholding evidence to
you, John?
jerryr
response 94 of 145: Mark Unseen   Oct 3 18:07 UTC 2000

could you be any more obtuse?  i am talking about information that the
prosecutors already have.  i'm just not going to share it with you.  i
tried to be nice and save y'all some effort because some of you keep
harping on how much m-nut lost and how it could have been avoided.

one mo' time - there is more involved here than m-nuts physical plant and the
replacement thereof.

if you have any more questions, contact the prosecutors.

brighn
response 95 of 145: Mark Unseen   Oct 3 18:35 UTC 2000

Ah. Being nice to the dumb mother fuckers.
Sorry for being rude in response to your obvious gregariousness.
jazz
response 96 of 145: Mark Unseen   Oct 3 18:43 UTC 2000

        Where did brighn (or myself for that matter) ever say or even imply
that "it could have been avoided"?

        Last I recall, I was actually supporting the argument that vandalism
damages a system beyond apparent replacement costs, and that it was unlikely
that even a full-time security staff could be expected to meet all possible
contingencies, let alone an unpaid volunteer staff working in their spare
time.
flem
response 97 of 145: Mark Unseen   Oct 3 19:40 UTC 2000

There seems to be a certain amount of confusion as to what is going on in this
trial.  I, for one, was under the impression that it was a *criminal*, not
a civil, trial.  The kid isn't being prosecuted because he did monetary damage
to m-net, but because he committed a crime.  
  If you rape someone, you don't generally cause them a great deal of
financial difficulty.  It can even be argued (occasionally; I'm certainly not
claiming this is the case for all or even a majority of rapes) that you don't
do any real damage to the victim.  It can even be, and has been, argued that
"she was asking for it."  Doesn't matter, it's still a crime and you're
(hopefully) still going to end up in jail for it.  
  IIRC, when you rob someone, the value of what was stolen is used to
determine how serious a crime it is (misdemeanor vs. felony), but, if I
understand correctly, that's a special rule that applies only to theft.  It
doesn't apply, for example, to assault.  ("The hospital bill was only $50,
your honor, so it shouldn't be a felony...")  
  In this case, I believe it to be the case that the law says that breaking
into a computer system without authorization is a felony.  End of story. 
Doesn't matter if it's a 386 or a supercomputer.  (I'm not sure I agree with
the law, but that's my understanding of what it says.)  
jazz
response 98 of 145: Mark Unseen   Oct 3 19:45 UTC 2000

        M-net was, at the time, wearing a tight red dress and "fuck me" pumps,
and therefore, deserved whatever it got.
jp2
response 99 of 145: Mark Unseen   Oct 3 20:14 UTC 2000

This response has been erased.

jazz
response 100 of 145: Mark Unseen   Oct 3 20:18 UTC 2000

        You've proven your command of foul language, now let's see if you have
a working knowledge of being able to substantiate your point and differentiate
between fact and opinion.
jp2
response 101 of 145: Mark Unseen   Oct 3 20:23 UTC 2000

This response has been erased.

 0-24   25-49   50-74   52-76   77-101   102-126   127-145    
Response Not Possible: You are Not Logged In
 

- Backtalk version 1.3.30 - Copyright 1996-2006, Jan Wolter and Steve Weiss