New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 989
Comments: 20
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image crkatk: Busted!: Hack attacks--a public embarrassment? image
Crack Attack
Hack attacks--a public embarrassment?
By Patrick Gray
ZDNet Australia

A 17-year-old Queensland youth was arrested last week on charges relating to a security breach at a prominent internet service provider (ISP). ZDNet Australia spoke to the director of the recently established Australian High Tech Crime Centre (AHTCC), federal agent Alastair MacGibbon, about the arrest, and found out why letting the world know you've been hacked isn't necessarily a public relations disaster.

If there's one thing MacGibbon wants known, it's that the AHTCC wants more companies to come forward when they've been the victim of a computer crime. It's heartening to see how the victim reacted in this case, he said. We understand that the vast bulk of these crimes aren't reported to us and we are in the process of encouraging industry to report matters to us.

Many companies fear the negative publicity that comes with acknowledging that data has been unlawfully accessed, he said. However MacGibbon argues that companies should not hesitate to report these crimes because trying to sweep incidents under the carpet may backfire. It's a small industry... people find out, he explained.

The way in which pharmaceutical companies now handle poisoning scares is an example of a change in corporate attitudes to reporting crimes that may cause fear and concern among customers, MacGibbon says.

We've seen quite a shift in the way businesses handle the publicity around product contamination issues, and how they respond to them as good corporate citizens [in the last] ten or twenty years ago, he said. We argue it's the same thing when it comes to this type of quite catastrophic attack against a service provider, for example, we say that there are actually some positives that can come out of it. You're showing yourself to be someone that's willing to go to the police and work with the police and have a person prosecuted.

What a person does when they take over an ISP is they're infringing on every single user of that ISP and what that company can say is 'we're actually out there protecting your interests by cooperating with lawful authorities in a lawful manner'. I think that's quite a change, he added.

The world's governments are by no means unified on the issue, MacGibbon said. Some countries have looked at some confidentiality issues where they will actually try to legislate to protect the victim corporation against exposure, he told ZDNet Australia . Other countries, like in the U.S., have gone in the exact opposite direction. Californian law, from what I understand, says that if you are company that has public information on and you have an incident in relation to a computer, you have to, by law, publicize that incident and let people know whose data has been compromised, which in this case would be all the users.

The AHTCC has its eyes on developments in the disclosure area. We constantly scan the horizon to see what's being done overseas, MacGibbon said.

It's not all about disclosure though, MacGibbon claims. Companies may simply be unaware that they've been the victim of a digital attack. Another reason why these matters aren't reported to us is by the very nature of the offence, people may not know that it's actually occurred and that's a real problem when it comes to IT incidents, he said.

Your home computer or your business computer might be compromised and you may just think it's behaving a bit anomalously and not being a technical person myself I may just turn it off and back on again. I might call up the IT helpdesk and say 'look for some reason I can't open up a word document' I may not realize that it's an IT security incident, he added. In the long run we usually find out why something has happened, but it may be a compromise that's gone on for quite some time... depending on the capability of the [attacker] and how much they want to do using the system that they've actually compromised, they may be in the system for quite some time before it's discovered. It depends on how sophisticated they are.

In the case of the recently breached ISP, the alleged offender was located and arrested within 24 hours of the report being filed. The victim provided us the right amount of information to be able to approach other providers who could assist in tracking down where the offender was, he said. It's a simple game where it can fall down at any point so what we had was good co-operation from the victim, and excellent cooperation from other providers that allowed us to lawfully obtain information to locate the person.

The victim has not yet been named; however the ISP will be identified as court actions progress. I wouldn't say who the victim is until such time as they actually want to say they are. This is again a part of our commitment to industry to make sure that we treat them with the level of respect they deserve, he said. They have a lot of considerations to take into account on how they manage their vulnerabilities, for example, and how to recover from the incident, and then how they inform their customers and the public of what happened.

We see that as being the job of the victim. What we say to industry is 'for as long as we can we will protect your identity', but at some stage it will obviously become known, and in this case it will become known at the very latest when it goes before the courts, he added.



ZDN
Posted on Tuesday, 04 November 2003 @ 04:30:00 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· HotScripts
· W3 Consortium
· ZDNet News
· More about Crack Attack
· News by phoenix22


Most read story about Crack Attack:
Beware Attacker from IP 200.55.7.235 and Whole 200.x.x.x Block

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register