Tangled Web - Tales of Digital Crime from the Shadows of Cyberspace.pdf

(2445 KB) Pobierz
Tangled Web : Tales of Digital Crime From the Shadows of Cyberspace
755288627.001.png
TANGLED
Tales
of
Digital
Crime
from the
Shadows
of
Cyberspace
RICHARD POWER
A Division of Macmillan USA
201 West 103rd Street, Indianapolis, Indiana 46290
WEB
755288627.002.png
Tangled Web: Tales of Digital Crime
from the Shadows of Cyberspace
Copyright 2000 by Que Corporation
All rights reserved. No part of this book shall be reproduced, stored in a
retrieval system, or transmitted by any means, electronic, mechanical, pho-
tocopying, recording, or otherwise, without written permission from the
publisher. No patent liability is assumed with respect to the use of the infor-
mation contained herein. Although every precaution has been taken in the
preparation of this book, the publisher and author assume no responsibility
for errors or omissions. Nor is any liability assumed for damages resulting
from the use of the information contained herein.
International Standard Book Number: 0-7897-2443-x
Library of Congress Catalog Card Number: 00-106209
Printed in the United States of America
First Printing: September 2000
02 01 00
Associate Publisher
Tracy Dunkelberger
Acquisitions Editor
Kathryn Purdum
Development Editor
Hugh Vandivier
Managing Editor
Thomas Hayes
Project Editor
Tonya Simpson
Copy Editor
Michael Dietsch
4 3 2
Indexer
Erika Millen
Trademarks
All terms mentioned in this book that are known to be trademarks or ser-
vice marks have been appropriately capitalized. Que Corporation cannot
attest to the accuracy of this information. Use of a term in this book should
not be regarded as affecting the validity of any trademark or service mark.
Proofreader
Benjamin Berg
Team Coordinator
Vicki Harding
Design Manager
Sandra Schroeder
Warning and Disclaimer
Every effort has been made to make this book as complete and as accurate
as possible, but no warranty or fitness is implied. The information provided
is on an “as is” basis. The author and the publisher shall have neither liabil-
ity nor responsibility to any person or entity with respect to any loss or
damages arising from the information contained in this book.
Cover Designer
Anne Jones
Interior Designer
Trina Wurst
Product Marketing
Manager
Amy Neidlinger
Publicity
Gardi Ipema Wilks
Layout Technicians
Ayanna Lacey
Heather Hiatt Miller
Stacey Richwine-DeRome
Contents at a Glance
Foreword xi
I Crime, War, and Terror in the Information Age 1
1 Welcome to the Shadow Side of Cyberspace 3
2 Inside the Mind of the Cybercriminal 9
3 Been Down So Long It Looks Like Up To Me: The Extent and Scope of the
Cybercrime Problem 21
4 Let It Bleed: The Cost of Computer Crime and Related
Security Breaches 39
II Hackers, Crackers, and Virus Writers 53
5 Did the 1990s Begin with a Big Lie? 55
6 Joy Riders: Mischief That Leads to Mayhem 65
7 Grand Theft Data: Crackers and Cyber Bank Robbers 87
8 Hacktivists and Cybervandals 115
9 The $80 Million Lap Dance and the $10 Billion Love Letter 141
III Spies and Saboteurs 157
10 Corporate Spies: Trade Secret Theft in Cyberspace 159
11 Insiders: The Wrath of the Disgruntled Employee 179
12 Infowar and Cyberterror: The Sky Is Not Falling, But… 191
IV Muggers and Molesters in Cyberspace 213
13 Identity Theft 215
14 Child Pornography on the Internet 223
V The Defense of Cyberspace 229
15 Inside Fortune 500 Corporations 231
16 Inside Global Law Enforcement 249
17 Inside the U.S. Federal Government 263
18 Countermeasures 279
Epilogue: The Human Factor 313
VI Appendixes 325
Glossary 327
A U.S. Laws and International Treaties 339
B Excerpt from Criminal Affidavit in the Ardita Case 369
C Resources and Publications 387
Index 403
Table of Contents
I Crime, War, and Terror
in the Information Age
1
1 Welcome to the Shadow Side of
Cyberspace 3
Types of Cybercrime 4
Types of Cybercriminals 6
2 Inside the Mind of the
Cybercriminal 9
“Stereotyping Can Be Dangerous” 10
“Intense Personal Problems” Are the Key
13
3 Been Down So Long It Looks Like
Up To Me: The Extent and Scope of
the Cybercrime Problem 21
The CSI/FBI Computer Crime and
Security Survey 22
Whom We Asked 24
Outlaw Blues 26
Types of Cyberattack 28
To Report or Not to Report 28
The Truth Is Out There 32
A Note on Methodology 32
Relevant Data from Other Sources 33
CERT/CC Statistics 33
Dan Farmer’s Internet Security
Survey 35
WarRoom Research’s Information
Security Survey 35
Conclusions 38
4 Let It Bleed: The Cost of Computer
Crime and Related Security
Breaches 39
How Do You Quantify Financial Losses
Due to Info Security Breaches? 44
You Can’t Fully Quantify the Loss if
You Haven’t Valued the Resource 44
II Hackers, Crackers, and
Virus Writers 53
5 Did the 1990s Begin with a Big Lie?
55
The First Serious Infrastructure Attack?
55
Public Cyberenemy No. 1? 57
The Worms Crawl In, the Worms Crawl
Out… 60
What the Morris Worm Did to
Systems 61
What the Morris Worm
Demonstrated 63
Conclusion 64
6 Joy Riders: Mischief That Leads to
Mayhem 65
The Rome Labs Case: Datastream
Cowboy and Kuji Mix It Up with the U.S.
Air Force 66
Investigators Wrestle with Legal
Issues and Technical Limitations 68
Datastream Cowboy’s Biggest
Mistake 69
Scotland Yard Closes in on
Datastream Cowboy 71
Kuji Hacks into Goddard Space
Flight Center 72
System Penetration from the Outside
47
Unauthorized Access from the Inside
47
Sabotage of Data or Network
Operations 48
Malicious Code 48
Don’t Underestimate “Soft Costs”
48
If We Can Quantify Losses, We Can
Calculate ROI 50
Zgłoś jeśli naruszono regulamin