25.03.2015 Views

Hass & Associates Online Reviews on the Evolution of Hacking

Computer hacking was once the realm of curious teenagers. It's now the arena of government spies, professional thieves and soldiers of fortune.

Computer hacking was once the realm of curious teenagers. It's now the arena of government spies, professional thieves and soldiers of fortune.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HASS & ASSOCIATES ONLINE REVIEWS<br />

The Evoluti<strong>on</strong> <strong>of</strong> <strong>Hacking</strong><br />

Computer hacking was <strong>on</strong>ce <strong>the</strong> realm <strong>of</strong> curious teenagers. It's now <strong>the</strong> arena <strong>of</strong><br />

government spies, pr<strong>of</strong>essi<strong>on</strong>al thieves and soldiers <strong>of</strong> fortune.<br />

Today, it's all about <strong>the</strong> m<strong>on</strong>ey. That's why Chinese hackers broke into Lockheed Martin and stole<br />

<strong>the</strong> blueprints to <strong>the</strong> trilli<strong>on</strong>-dollar F-35 fighter jet. It's also why Russian hackers have sneaked into<br />

Western oil and gas companies for years.<br />

The stakes are higher, too. In 2010, hackers slipped a "digital bomb" into <strong>the</strong> Nasdaq that nearly<br />

sabotaged <strong>the</strong> stock market. In 2012, Iran ruined 30,000 computers at Saudi oil producer Aramco.<br />

And think <strong>of</strong> <strong>the</strong> immense (and yet undisclosed) damage from North Korea's cyberattack <strong>on</strong> S<strong>on</strong>y<br />

Pictures last year. Computers were destroyed, executives' embarrassing emails were exposed,<br />

and <strong>the</strong> entire movie studio was thrown into chaos.<br />

It wasn't always this way. <strong>Hacking</strong> actually has some pretty innocent and harmless beginnings.


CURIOSITY CREATED THE HACKER<br />

The whole c<strong>on</strong>cept <strong>of</strong> "hacking" sprouted from <strong>the</strong> Massachusetts Institute <strong>of</strong> Technology nearly 50<br />

years ago. Computer science students <strong>the</strong>re borrowed <strong>the</strong> term from a group <strong>of</strong> model train<br />

enthusiasts who "hacked" electric train tracks and switches in 1969 to improve performance.<br />

These new hackers were already figuring out how to alter computer s<strong>of</strong>tware and hardware to<br />

speed it up, even as <strong>the</strong> scientists at AT&T Bell Labs were developing UNIX, <strong>on</strong>e <strong>of</strong> <strong>the</strong> world's first<br />

major operating systems.<br />

<strong>Hacking</strong> became <strong>the</strong> art <strong>of</strong> figuring out unique soluti<strong>on</strong>s. It takes an insatiable curiosity about how<br />

things work; hackers wanted to make technology work better, or differently. They were not<br />

inherently good or bad, just clever.<br />

In that sense, <strong>the</strong> first generati<strong>on</strong> <strong>of</strong> true hackers were "phreakers," a bunch <strong>of</strong> American punks<br />

who toyed with <strong>the</strong> nati<strong>on</strong>'s teleph<strong>on</strong>e system. In 1971, <strong>the</strong>y discovered that if you whistle at a<br />

certain high-pitched t<strong>on</strong>e, 2600-hertz, you could access AT&T's l<strong>on</strong>g-distance switching system.<br />

They would make internati<strong>on</strong>al ph<strong>on</strong>e calls, just for <strong>the</strong> fun <strong>of</strong> it, to explore how <strong>the</strong> teleph<strong>on</strong>e<br />

network was set up.<br />

This was low-fi stuff. The most famous phreaker, John Draper (aka "Cap'n Crunch) earned his<br />

nickname because he realized <strong>the</strong> toy whistle given away in cereal boxes emitted just <strong>the</strong> right<br />

t<strong>on</strong>e. This trained engineer took that c<strong>on</strong>cept to <strong>the</strong> next level by building a custom "blue box" to<br />

make those free calls.<br />

This surreptitious little box was such a novel idea that young engineers Steve Wozniak and Steve<br />

Jobs started building and selling it <strong>the</strong>mselves. These are <strong>the</strong> guys who would later go <strong>on</strong> to start<br />

Apple.<br />

Wire fraud spiked, and <strong>the</strong> FBI cracked down <strong>on</strong> phreakers and <strong>the</strong>ir blue boxes. The laws didn't<br />

quite fit, though. Kids were charged with making harassing ph<strong>on</strong>e calls and <strong>the</strong> like. But federal<br />

agents couldn't halt this phenomen<strong>on</strong>.<br />

A tech-savvy, inquisitive and slightly anti-authoritarian community had been born.


A NEW WAVE OF HACKERS<br />

The next generati<strong>on</strong> came in <strong>the</strong> early 1980s, as people bought pers<strong>on</strong>al computers for <strong>the</strong>ir<br />

homes and hooked <strong>the</strong>m up to <strong>the</strong> teleph<strong>on</strong>e network. The Web wasn't yet alive, but computers<br />

could still talk to <strong>on</strong>e ano<strong>the</strong>r.<br />

This was <strong>the</strong> golden age <strong>of</strong> hacking. These curious kids tapped into whatever computer system<br />

<strong>the</strong>y could find just to explore. Some broke into computer networks at companies. O<strong>the</strong>rs told<br />

printers at hospitals hundreds <strong>of</strong> miles away to just spit out paper. And <strong>the</strong> first digital hangouts<br />

came into being. Hackers met <strong>on</strong> text-<strong>on</strong>ly bulletin board systems to talk about phreaking, share<br />

computer passwords and tips.<br />

The 1983 movie "War Games" depicted this very thing, <strong>on</strong>ly <strong>the</strong> implicati<strong>on</strong>s were disastrous. In it,<br />

a teenager in Washingt<strong>on</strong> state accidentally taps into a military computer and nearly brings <strong>the</strong><br />

world to nuclear war. It's no surprise, <strong>the</strong>n, that <strong>the</strong> FBI was <strong>on</strong> high alert that year, and arrested six<br />

teenagers in Milwaukee -- who called <strong>the</strong>mselves <strong>the</strong> 414s, after <strong>the</strong>ir area code -- when <strong>the</strong>y<br />

tapped into <strong>the</strong> Los Alamos Nati<strong>on</strong>al Laboratory, a nuclear weap<strong>on</strong> research facility.<br />

Nati<strong>on</strong>wide fears led <strong>the</strong> U.S. C<strong>on</strong>gress to pass <strong>the</strong> Computer Fraud and Abuse Act in 1986.<br />

Breaking into computer systems was now a crime <strong>of</strong> its own.<br />

The damage <strong>of</strong> hacking started getting more serious, too. In 1988, <strong>the</strong> government's ARPAnet, <strong>the</strong><br />

earliest versi<strong>on</strong> <strong>of</strong> <strong>the</strong> Internet, got jammed when a Cornell University graduate student, curious<br />

about <strong>the</strong> network's size, created a self-replicating s<strong>of</strong>tware worm that multiplied too quickly.<br />

The next year, a few German hackers working for <strong>the</strong> Russian KGB were caught breaking into <strong>the</strong><br />

Pentag<strong>on</strong>. In 1990, hacker Kevin Poulsen rigged a Los Angeles radio stati<strong>on</strong>'s ph<strong>on</strong>e system to win<br />

a Porsche, <strong>on</strong>ly to be arrested afterward.<br />

The cat-and-mouse game between law enforcement and hackers c<strong>on</strong>tinued throughout <strong>the</strong> 1990s.<br />

Some hacked for m<strong>on</strong>ey. Russian ma<strong>the</strong>matician Vladimir Levin was caught stealing $10 milli<strong>on</strong><br />

from Citibank. O<strong>the</strong>rs did it for revenge. Tim Lloyd wiped <strong>the</strong> computers at Omega Engineering in<br />

New Jersey after he was fired.<br />

But hacks were still more <strong>of</strong> an annoyance than anything devastating, though it was quickly<br />

becoming apparent that <strong>the</strong> potential was <strong>the</strong>re. The stock market, hospitals, credit card<br />

transacti<strong>on</strong>s -- everything was running <strong>on</strong> computers now. There was a b<strong>on</strong>e-chilling moment when


a ragtag group <strong>of</strong> hackers calling <strong>the</strong>mselves L0pht testified before C<strong>on</strong>gress in 1998 and said <strong>the</strong>y<br />

could shut down <strong>the</strong> Internet in 30 minutes.<br />

The danger was suddenly more real than ever.<br />

FROM CURIOSITY TO CRIMINAL<br />

The ethos was starting to change, too. Previously, hackers broke into computers and networks<br />

because <strong>the</strong>y were curious and those tools were inaccessible. The Web changed that, putting all<br />

that stuff at every<strong>on</strong>e's fingertips. M<strong>on</strong>ey became <strong>the</strong> driving force behind hacks, said C. Thomas,<br />

a member <strong>of</strong> L0pht who is known internati<strong>on</strong>ally as <strong>the</strong> hacker "Space Rogue."<br />

An unpatched bug in Windows could let a hacker enter a bank, or a foreign government <strong>of</strong>fice.<br />

Mafias and governments were willing to pay top dollar for this entry point. A totally different kind <strong>of</strong><br />

black market started to grow.<br />

The best pro<strong>of</strong> came in 2003, when Micros<strong>of</strong>t started <strong>of</strong>fering a $5 milli<strong>on</strong> bounty <strong>on</strong> hackers<br />

attacking Windows.<br />

"It's no l<strong>on</strong>ger a quest for informati<strong>on</strong> and knowledge by exploring networks. It's about dollars,"<br />

Thomas said. "Researchers are no l<strong>on</strong>ger motivated to get stuff fixed. Now, <strong>the</strong>y say, 'I'm going to<br />

go looking for bugs to get a paycheck - and sell this bug to a government.' "<br />

Loosely affiliated amateurs were replaced by well-paid, trained pr<strong>of</strong>essi<strong>on</strong>als. By <strong>the</strong> mid-2000s,<br />

hacking bel<strong>on</strong>ged to organized crime, governments and hacktivists.<br />

FIRST, CRIME: Hackers around <strong>the</strong> world wrote malicious s<strong>of</strong>tware (malware) to hijack tens<br />

<strong>of</strong> thousands <strong>of</strong> computers, using <strong>the</strong>ir processing power to generate spam. They wrote<br />

banking trojans to steal website login credentials.<br />

<strong>Hacking</strong> payment systems turned out to be insanely lucrative, too. Albert G<strong>on</strong>zalez's <strong>the</strong>ft <strong>of</strong> 94<br />

milli<strong>on</strong> credit cards from <strong>the</strong> company TJX in 2007 proved to be a precursor to later retailer data<br />

breaches, like Target, Home Depot and many more.<br />

Then <strong>the</strong>re's government. When <strong>the</strong> United States wanted to sabotage <strong>the</strong> Iranian nuclear program<br />

in 2009, it hacked a development facility and unleashed <strong>the</strong> most dangerous computer virus <strong>the</strong><br />

world has ever seen. Stuxnet caused <strong>the</strong> Iranian lab computers to spin centrifuges out <strong>of</strong> c<strong>on</strong>trol.


This was unprecedented: a digital strike with extreme physical c<strong>on</strong>sequences.<br />

Similarly, <strong>the</strong>re's pro<strong>of</strong> that Russia used hackers to coordinate its attack <strong>on</strong> Georgia during a fiveday<br />

war in 2008, taking out key news and government websites as tanks rolled into those specific<br />

cities.<br />

Then <strong>the</strong>re are hacktivists. The populist group An<strong>on</strong>ymous hacks into police departments to<br />

expose <strong>of</strong>ficer brutality and floods banks with garbage Internet traffic. A vigilante known as "The<br />

Jester" takes down Islamic jihadist websites.<br />

What exists now is a tricky world. The White House gets hacked. Was it <strong>the</strong> Russian government<br />

or Russian nati<strong>on</strong>alists acting <strong>on</strong> <strong>the</strong>ir own? Or freelance agents paid by <strong>the</strong> government? In <strong>the</strong><br />

digital realm, attributi<strong>on</strong> is extremely difficult.<br />

Meanwhile, it's easier than ever to become a hacker. Digital weap<strong>on</strong>s go for mere dollars <strong>on</strong> easily<br />

accessible black markets <strong>on</strong>line. An<strong>on</strong>ymity is a few clicks away with <strong>the</strong> right s<strong>of</strong>tware. And <strong>the</strong>re<br />

are high-paying jobs in defending companies like Google or JPMorgan Chase -- or attacking <strong>the</strong>m.<br />

As a result, law enforcement tolerance for hacking has fallen to zero. In 1999, <strong>the</strong> hacker Space<br />

Rogue exposed how FAO Schwarz's website was leaking c<strong>on</strong>sumer email addresses and forced<br />

<strong>the</strong> company to fix it. He was cheered. When Andrew Auernheimer (known as "weev") did <strong>the</strong><br />

same thing to AT&T in 2010, he spent more than a year in pris<strong>on</strong> until his case was overturned <strong>on</strong><br />

a technicality.<br />

The days <strong>of</strong> mere curiosity are over.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!