Home > Articles

Interview - Anonymous

Part III: Questions Answered About Computers and Computer Security

1. What is the purpose of the computer security archive that you are compiling?

Me and several associates are tying with using autonomous agents to create a system (called IntelligentsiaIT) that will make it easier for researchers to analyze security incidents and correlate possible similarities. Somewhere in all that data, we hope to find some answers about how security weaknesses evolve.

2. Who is the intended user of the security archive and is it available to the general public at this time?

Not yet. Currently, it's a research project, sponsored by...ahem...a CPA firm and a few AI enthusiasts.

3. Are difficulties for the average end user to protect himself too large when shopping in the internet without losing the inherent advantages?

I don't think so. Security continues to improve, too. By the time we're all using IPV6, users won't have to worry much.

4. Which form of e-money do you feel is the most secure?

I don't like the concept of e-money. Next, we'll be authenticating ourselves by a mark on our right hands or our forehead.

5. What would the ideal payment system look like (in a visionary kind of way)?

Well, as I related, soon, your system will identify you biometrically and the money will automatically withdraw from your accounts. Hahahaha. No man shall buy or sell lest he have the mark of the beast or the number of his name. That's where we're going, isn't it?

6. What is your vision of where the internet will be 5 years time? In 10 years time? In 20 years time?

Soon, the Net will no longer be something that you surf. Instead, it will be an engine. Smart house toilets will analyze your human waste, find that you need insulin, notify you and your doctor by email, and so on. Your refrigerator will see you need eggs and use the Net to order more. The Net will become invisible but completely pervasive, tracking and managing every aspect of your life. Your automobile will call for help when it needs oil and your mechanic will know, instantly, that you need an oil change, and so on. Which is how it should be. Why should you have to search for info? It takes forever. Autonomous agents will do nearly everything for you. At that stage, the Net will be everywhere...in cars, watches, phones, bathrooms...everywhere, but largely invisible.

7. Do you see differing security philosophies in large and small companies in Europe, North America or the so-called tiger countries?

Security awareness has heightened to the point where in the...."Holy Roman Empire" countries (EU, US, Australia, etc)...that most companies now realize that they need security. Smaller companies tend to be more concerned (naturally) with privacy. Larger companies have different concerns. One simple concern (which I see arising more now in larger firms) is liability. Many American companies now spy on their employees. They watch, for example, all email going out, to determine if employees are mailing out sensitive information to competitors. They also watch for sexual harassment in inter-office mail, and so forth. Other issues concern in-house websites and so forth. But from a purely strategic perspective, I do see evidence of a growing movement toward deception (ala Fred Cohen's Deception Toolkit). One interesting development, too, is the introduction of AI into security. I know an ex-Air Force officer currently working with a physicist and mathematician on a system that can ascertain new attacks before they ever develop a signature. (A signature, in this case, is any string or occurrence common to a particular attack). This system - which, incredibly, they're using Excel for, as I'll momentarily explain - analyzes human usage behavior, not code. And many other universities and firms are studying similar things now. Unfortunately, of course, what we're talking about here is that security has become so important that it's now beginning to invade our privacy. But yes, there are major differences. Europeans are far more concerned with privacy. Also, some Europeans class certain types of information as unlawful whereas here, we do not. Our Constitution's First Amendment is, of course, inconsistent with many restrictions overseas. Hence, America has become a sort of haven for anyone who has odd political views. Naturally, companies are fearful that this will reflect badly on them (and perhaps, invite liability). So large companies do tend to watch their employees carefully. From a purely philosophical viewpoint, however, large companies have reverted to the KISS ("Keep it simple, stupid") principle. They establish an approved application set and expect their employees to stick to it. Employees don't always do that, of course. Bu nevertheless, if even a significant percentage do, that reduces risk. But I think all companies here now have arrived at a simple conclusion: security is an ongoing process and not an end. Hence, nearly all companies are now aware of it. Unfortunately, however, many small companies just don't have the resources, time, or personnel to handle security 24/7. That means they end up buying suites from folks like NAI. Much of the time, these suites (while obviously not perfect) do handle the most serious problems. (Oh yeah...briefly, the Excel application I described above is nothing short of amazing. Each cell carries massive formulas that, when tied together, can discern suspicious from non-suspicious behavior almost 90% of the time. AI from Excel. As a Unix guy, I was skeptical, but they did it).

8. Which governments do you feel are doing the right kinds of things to promote the awareness that network security is important?

None. Well, I shouldn't say that. Our Congress, for example, recently passed (and now is prepared to have agencies enforce) regulations regarding the transmission of confidential medical data. Surprisingly, the regulations (in our Federal Register) are actually worth something. Many times, governments pass largely perfunctory measures to placate an electorate. I was shocked (and quite pleased) to find that our government - for once - wasn't snoozing on the job. In fact, the regulations are so stringent, I don't think many hospitals can comply without spending thousands (or perhaps millions). But hey....medical data should have some protection. Other governments, I cannot speak for, except that I see many governments restricting what private citizens can say on their websites. Of this, I cannot approve. If you despise Germans, Americans, Australians, Whites, Blacks, Asians, Jews, or whatever, you should have the right to say it. By driving such groups underground, governments make a cardinal mistake. Having unpopular views has always been popular and chic. You make it ten times more so when you outlaw a given position. True, the Internet - more than any other single invention - can show you that nuts are everywhere in full force. Never quicker will you realize that many of your countrymen are stark raving mad than when you join an Internet mailing list. But isn't that why SAIC loves the Net so much? Why not know who you're dealing with? The Net exposes everyone and all their ideas. It's a great intelligence tool to study the masses. Let it ride and you'll learn much. Outlaw speech and you miss the good parts. But also...and this will likely shock you....I favor privacy big time. Hence, I think that many Euro policies make sense. Here, we sell names and addresses over and over again. You subscribe to a web site for women and suddenly, your mailbox is filled with advertisements for Wolford. Now, while I think Wolford makes the best hosiery in the world, I'm a guy and don't wear panty hose. And if I didn't have women to put them to, I'd be angry. Human privacy seems to be a basic human right. If I want to live without being bombarded with advertisements, that's my right. And I don't want anyone having my medical information, either. But incredibly (because my government so often screws up), I do think that the US has finally gotten around to making some decent progress in heightening security awareness.

9. Who do you feel should carry the major responsibility for secure systems, especially when one considers that most end users are small companies or private personal users?

That's a tough question. Most small companies can't afford a full-time security staff. Usually, they rely on their system administrator. Now, we often see these zealots on USENET and the security lists talking about making government regulations about how private networks should be secured. This is patently ridiculous. It's like when Webster (of dictionary fame) wanted to impose a fine for poor English usage. (Under his rules, I'd already be bankrupt, even with my excellent editors). If I were advising a small company, I'd tell it this: invest in the people you already have. Send them to school and seminars. Your system administrators are skilled folks - and the people most like to understand security issues. Invest in them. They're good people with fine minds and a natural aptitude. Cultivate that...they're already on the payroll, after all. They're not going to cost you anywhere near as much as some outside service, and their loyalty is what you really need. Without that - and their diligence - all the outside firms in the world can't save you.

10. Can one reasonably expect the average man on the street to understand his computer in a way that gives him the ability to secure his computer? The average driver cannot repair security problems in his car, so why should the end user have to do this for his computer?

That's a good point, and a hard-to-answer question. The problem isn't users, though. It's vendors (and yeah, Microsoft, I'm talking to you, even though you're only one offender of many). Users wouldn't need to secure anything if vendors audited their code (or audited it more efficiently). The folks at OpenBSD do it with a nominal staff and a few donations ("no remote holes in four years"). Why can't larger firms - Microsoft, Sun, HP - do the same? Which is money better spent, 1-minute spots on network television or a good security code audit? You figure it out. Unfortunately, the reality is, users must find some measure of security on their own - because vendors aren't doing that great of a job. But yes....the average computer user can pick up a few books and definitely secure their system.

11. Is data free? Should data be free, e.g. what are your feelings about Napster and the music industry?

Ugh. Here, you ask a man who subsists on royalties what he thinks about Napster. Heh. No, I don't think it should be entirely free (music, that is). What's wrong with charging a few cents per download, though? I mean, take away the expensive packaging, the plastic, the jewel case, the CD, the paperwork, the credits, the distribution, the storage fees, and so on. That's what you're paying for. And when you take all that away, and divide the songs up, how much are you actually paying for each song? Probably a few cents. So why can't firms like Napster charge a few cents a song? Now, I have different views on the MPAA, words which you cannot print, I'm sure. So, some Linux knuckleheads found a way to play DVDs on Linux. I think that's great. I have a bumper sticker that addresses this issue. You likely already know what it says, so I'll leave it at that.

12. As a security expert aren't you worried that the information in the book will, in some cases, be counterproductive by giving beginners an idea of how best to go about cracking other people's computers?

No. Crackers today become hackers tomorrow who become security specialists the day after. No one does wrong the whole of their life unless they have real problems. I know Mitnik (not very well, but I know him). He's a good dude. Made some mistakes, for sure, but he's no Justin Tanner Peterson. As I once wrote in a book....if you want to learn how to crack systems, set up an intranet and do it. There's absolutely no reason to break the law (although, I've broken it often enough, just for excitement. I dunno.) I do know, though, that it's important that every system administrator know what crackers know.

13. In the long run, do you feel that the bazaar or the cathedral provide the higher security and usability for the average user?

If by that, do you mean I favor open source, yes. However, I am the farthest thing from a communist on this planet. I don't hate Bill Gates, I admire him. Someone so wily, so ruthless, so driven...how can you not admire him? But to the question....projects like OpenBSD promise much better security. Absolutely. Linux is a little shaky, though, chiefly because so many newer programmers (unfamiliar with security) contribute fine tools that have security flaws.

14. Should Microsoft be broken up?

You asked the wrong person, because I have extensive education regarding antitrust issues. I maintain precisely the same attitude as our Oliver Wendell Holmes did. "Antitrust is damned nonsense". Endless studies have found this to be true. Turns out that Rockefeller (in addition to help saving the whales as a byproduct) drove down prices so much that whale oil became a dead issue. As Judge Bork once said, antitrust statutes are anti-competitive in themselves. The free market does work. When companies like Microsoft do unpopular things (and sometimes, turn out what purists consider deficient products), competitors do emerge (e.g. Linux). Let the market work. So, no...I think Microsoft should go about its merry way without government interference (and if Linux kicks Windows' ass, them's the breaks).

15. To what extent is the threat of cyberwar and cyberterrorism a marketing tool for the military and security experts like yourself - the Y2K problem was nowhere near as bad as all the so-called experts said it would be?

Cyberwar is a legitimate but widely overblown concern. It could and probably will happen, but hey....ever had a blackout in your area? Did you die because you didn't have your computer access? The real cyberwar questions relate specifically to military equipment that relies on networking and that IS a legitimate issue. But it's always been that way. Jamming radio signals is age-old stuff. Similarly, the hawks will find a way to secure our military equipment.

16. Why is the consumer awareness for security so poor, or why do people accept insecure tools (e.g. Javascript security holes), poor implementation (e.g. Netscape's random numbers) or just plain lousy software design (e.g. various problems surrounding Microsoft products)?

Because people don't really care. Which is more important to you? Your favorite television show or your computer security? People don't realize the tremendous damage that can be done, so they don't care. (Also, corporate propaganda keeps telling people that they're safe - when they aren't.)

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020