![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]()
Las Vegas, Aug 5, 2006 Organized crime is winning the Internet security war, specialists warned at the world's foremost gathering of computer hackers in Las Vegas on Saturday. The online peril is no longer brilliant young social outcasts penetrating networks for notoriety; it is international crime rings swiping billions of dollars with keystrokes and malicious computer codes, cyber cops agreed. Ironically, potential champions in the battle for Internet privacy were sought among the thousands of hackers that made pilgrimages to the US gambling mecca nicknamed "Sin City" for the three-day DefCon 14 conference. Online evil doers were crime rings working out of countries such as Russia, Romania and Brazil, and their nefarious technical skills were keeping ahead of computer security experts, veterans of the cyber-crime battle said. "We are getting our butts kicked, there is no doubt about it," said Dan Hubbard, vice president of security research at Websense. "There is a lot more of a bond and a sharing of tools in their society than in ours." DefCon, in its 14th year, was a neutral ground where hackers, computer security professionals and US government agents exchanged expertise, according to organizers. "The hacker is the good guy," said Joe Grand, who described himself as an inventor by day and a hardware hacker by night. "A hacker is someone interested in figuring out how to make things work." Kenneth Geers explained that he was at DefCon to glean new hacking tactics and recruit talent to join him at his job hardening the US military's computer network. "If we are not getting into the weeds and hearing what the hackers are saying about weaknesses and vulnerabilities, we are absolutely screwed," Geers said. "We seek out rock star hackers because they live and breathe this stuff" For Geers, the goal was to prevent aircraft carrier's communications from being routed to enemies or missile guidance systems from being compromised. Online onslaughts were a relentless reality for ordinary computer users, said Gadi Evron, who managed Internet security for the Israeli government before going to work for the firms SecuriTeam and Beyond Security. "A lot of it involves the mafia," Evron said during a panel discussion titled "Internet Wars 2006." "This is not about kiddies, hackers who sit around and tinker. It is about using the Internet for real crime." More than two billion dollars will be stolen this year by online "phishing," using fake website and bogus e-mails to trick people into revealing personal information then used for identity theft, according to Evron. That loss will be multiplied by attacks involving the secret implanting of computer codes that can do things such as record keystrokes used for online banking or take remote control of computers, Evron said. There is such a glut of stolen credit card data that it can be bought online for three dollars each, said special agent Andrew Fried of the US Internal Revenue Service. Fried estimated that one in five home computers in the country was infected with malicious computer code, or "malware." "We have gone to houses and done search warrants only to find people's computers were being used without them knowing it," Fried said. "Most of what I see is systems being compromised to be taken over." Armies of zombie computers can be used to attack websites of companies that depend on Internet business for their revenues, the specialists explained. Criminals commanding such "botnets" can demand money from the companies in exchange for not crippling their online business. "The whole idea of extortion on the Internet is funny to me," Evron said. "They won't protect you. If you pay them they will probably attack you anyway, and they will be back." Cyber crime ranks only behind terrorism and counter-intelligence as top priorities at the Federal Bureau of Investigation, special agent Thomas Grasso said during the panel discussion. Collaboration with counterparts such as Interpol and Scotland Yard are vital to combat crime rings that often take refuge in countries with scant police resources, Grasso said. The law and computer security technology have lagged behind criminal techniques on the Internet, according to Grasso. "The Internet is not safe and your e-mail is not safe," Evron said. "It is an arms race and all we can do is enter that arms race from all different angles." Community Email This Article Comment On This Article Related Links Learn about Cyberwar Systems and Policy Issues at SpaceWar.com Cyberwar - Internet Security News - Systems and Policy Issues
![]() ![]() LexisNexis has broadened its information-sharing services for government intelligence and security agencies. LexisNexis Advanced Government Solutions is a secure research tool for national security use, which provides federal agencies with secure and easily accessible data, which can be accessed through a secure Internet connection or internally via agency systems where LexisNexis data has been integrated into internal data files. |
![]() |
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2006 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA PortalReports are copyright European Space Agency. All NASA sourced material is public domain. Additionalcopyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement |