{"id":182,"date":"2004-10-11T16:58:34","date_gmt":"2004-10-11T20:58:34","guid":{"rendered":""},"modified":"2006-05-21T18:50:52","modified_gmt":"2006-05-21T22:50:52","slug":"know_you_enemy_does_he_really_know_them","status":"publish","type":"post","link":"https:\/\/fgiasson.com\/blog\/index.php\/2004\/10\/11\/know_you_enemy_does_he_really_know_them\/","title":{"rendered":"Know you Enemy &#8211; Does he really know them?"},"content":{"rendered":"<p><center><br \/>\n<strong>Know you Enemy<\/strong><br \/>\n<em>Does he really know them?<\/em><br \/>\n<\/center><\/p>\n<p>First, I want to excuse me for the lack of posts in the last 4 days, I had other things to do and had a shortage of time. So, the article that I&#8217;ll comment is 5 days old but I want to comment it anyway.<\/p>\n<p>There is an <a href=\"http:\/\/www.computerweekly.com\/articles\/article.asp?liArticleID=133966\">article <\/a>that I need to comment on. The problem with it is that he doesn&#8217;t focus on his subject, go everywhere and try to cover a wide question in a little article. The title is &#8220;<a href=\"http:\/\/www.computerweekly.com\/articles\/article.asp?liArticleID=133966\">Know your enemy<\/a>&#8221; &#8212; clich\u00e9. He writes on 3 main subjects: Companies resources (new network technologies), third world hackers (money as motivation) and others obscure ones (custom software and social engineering). There is what he said about the second subject and I want to comment on:<\/p>\n<p>Should US companies worry about hackers in Russia and other countries?<br \/>\nHackers from countries where the economy is less developed than the US<br \/>\nare more motivated by money than by pride when they start trespassing<br \/>\non US companies &#8211; as opposed to US hackers, who are motivated more by<br \/>\npride than money. (There are many other ways that you can make money<br \/>\nin the US.)<br \/>\nAlso, money is a stronger motivator than pride. That&#8217;s why people<br \/>\nmotivated by money are more dangerous. Hackers are businesspeople [if<br \/>\nthey are motivated by money]. In most cases, they are probably just<br \/>\nhaving difficulties in their countries finding and exploring<br \/>\nopportunities to work.<br \/>\nIf a company that is hacked into can explore with a hacker his or her<br \/>\ntalents in a more peaceful way, the victim can only benefit. If these<br \/>\nhackers are businesspeople, they can be redirected by being offered a<br \/>\nbetter deal than the one they might get by creating pressure through<br \/>\nhacking.<br \/>\nI deeply believe in this point. It is hard, however, to generalise too<br \/>\nmuch because every case involves different kinds of people and<br \/>\ndifferent circumstances.<br \/>\nWhat security measures offer the best protection against hackers?<br \/>\nKeep the hackers occupied if you recognise them as a threat. This<br \/>\nmight be similar to what some countries have done with their nuclear<br \/>\nscientists &#8211; Russia, for example, keeps them under close supervision<br \/>\nand treats them well, but above all keeps them busy professionally.<\/p>\n<p>The problem is that he make too emphasis on the typical hacker of Hollywood. Really, he is not a threat. The real threats are the criminal groups. They begin to see benefits with cyber crimes and they exploit it. They exploit the internationalisation of the Internet and the lack of law applicability of many countries. This is the real problem. It&#8217;s true that the motivator is the money in this case too, but good luck to employ them after. I think that he talk about a minority of cases, and by doing so, he&#8217;ll not get rid of the real problem, the real danger, the criminal groups implication in the cyberspace.<\/p>\n<p>It&#8217;s my 2 penny to the discussion.<\/p>\n<p>[In addition to the post: 12 October 2004]<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<br \/>\nI just read <a href=\"http:\/\/www.schneier.com\/blog\/\">Bruce Schneier&#8217;s <\/a>October blog posts. He talks about this subject the 4 October with Bill Brenner from <a href=\"http:\/\/searchsecurity.techtarget.com\/originalContent\/0,289142,sid14_gci1011474,00.html\">SearchSecurity.com<\/a>. It&#8217;s interesting to see that I&#8217;m not alone to share this view. I know that many other people do too. There is the excerpt <a href=\"http:\/\/www.schneier.com\/blog\/archives\/2004\/10\/schneier_micros.html\">from his post<\/a>:<\/p>\n<p>&#8220;What&#8217;s the biggest threat to information security at the moment? <\/p>\n<p>Schneier: Crime. Criminals have discovered IT in a big way. We&#8217;re seeing a huge increase in identity theft and associated financial theft. We&#8217;re seeing a rise in credit card fraud. We&#8217;re seeing a rise in blackmail. Years ago, the people breaking into computers were mostly kids participating in the information-age equivalent of spray painting. Today there&#8217;s a profit motive, as those same hacked computers become launching pads for spam, phishing attacks and Trojans that steal passwords. Right now we&#8217;re seeing a crime wave against Internet consumers that has the potential to radically change the way people use their computers. When enough average users complain about having money stolen, the government is going to step in and do something. The results are unlikely to be pretty.&#8221;<br \/>\n&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Know you Enemy Does he really know them? First, I want to excuse me for the lack of posts in the last 4 days, I had other things to do and had a shortage of time. So, the article that I&#8217;ll comment is 5 days old but I want to comment it anyway. There is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[56],"tags":[],"class_list":["post-182","post","type-post","status-publish","format-standard","hentry","category-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=182"}],"version-history":[{"count":0,"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/182\/revisions"}],"wp:attachment":[{"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fgiasson.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}