[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Clips October 29, 2003
- To: "Lillie Coney":;, Gene Spafford <spaf@xxxxxxxxxxxxxxxxx>;, John White <white@xxxxxxxxxx>;, Jeff Grove <jeff_grove@xxxxxxx>;, goodman@xxxxxxxxxxxxx;, David Farber <dave@xxxxxxxxxx>;, glee@xxxxxxxxxxxxx;, Andrew Grosso<Agrosso@xxxxxxxxxxxxxxxx>;, ver@xxxxxxxxx;, lillie.coney@xxxxxxx;, v_gold@xxxxxxx;, harsha@xxxxxxx;, KathrynKL@xxxxxxx;, computer_security_day@xxxxxxx;, waspray@xxxxxxxxxxx;, BDean@xxxxxxx;, mguitonxlt@xxxxxxxxxxx, sairy@xxxxxxxxx;
- Subject: Clips October 29, 2003
- From: Lillie Coney <lillie.coney@xxxxxxx>
- Date: Wed, 29 Oct 2003 10:57:48 -0500
Clips October 29,
2003
ARTICLES
Feds grant DMCA exceptions
Mandate Is Upheld for Digital TV Tuners
Web Group Backs Microsoft in Patent Suit
Orbitz investigates security breach
Justice renews Web use monitor
Officials unveil first phase of foreign visitor tracking system
Hackers get novel defense: The computer did it
Outburst From Sun Headed For Earth
Government unveils system to check identities of foreign visitors
Brazil Becomes a Cybercrime Lab
*******************************
CNET News.com
Feds grant DMCA exceptions
Last modified: October 28, 2003, 6:16 PM PST
By John Borland
The Library of Congress created on Tuesday four narrow exemptions to a
controversial digital-piracy statute but faces criticism from free-speech
activists, who had hoped for more exceptions.
As part of a regular process of reviewing the Digital Millennium
Copyright Act, regulators created four new instances in which it is legal
to crack digital copyright protections. Such protections can now be
broken to access:
? Lists of sites blocked by commercial Internet filtering software, but
not spam-fighting lists.
? Computer programs protected by hardware dongles that are broken or
obsolete.
? Computer programs or video games that use obsolete formats or
hardware.
? E-books that prevent read-aloud or other handicapped access formats
from functioning.
Some DMCA critics had asked for far more sweeping exemptions, such as the
ability to break through copy or usage restrictions on DVDs and CDs in
order to use the content in different devices and mediums.
"It's disappointing that the U.S. Copyright Office and the Librarian
(of Congress) continue to relinquish their power to protect the rights of
American consumers to lawfully use their own property," said Robin
Gross, executive director of IP Justice, a digital rights activist group.
In a statement accompanying the ruling, Librarian of Congress James
Billington said that he did not have the power to go as far as critics
wanted and that many of the most expansive proposals for exemptions had
been put forward by people who misunderstood the law.
Some participants "sought exemptions that would permit them to
circumvent access controls on all works when they are engaging in
particular noninfringing uses of those works," Billington wrote in
his statement. "The law does not give me that power."
The exemptions will be in effect for three years, after which time
regulators will examine the law again.
*******************************
Los Angeles Times
Mandate Is Upheld for Digital TV Tuners
From Reuters
October 29, 2003
A U.S. appeals court upheld federal regulations requiring television set
manufacturers to install tuners that can receive high-quality digital
broadcast signals in new sets starting next summer.
The Federal Communications Commission in August 2002 ordered that digital
tuners be included in new sets as part of an effort to jump-start the
lagging transition to crisper digital television, targeted for completion
by 2007.
The Consumer Electronics Assn., which represents manufacturers such as LG
Electronics Ltd.'s Zenith and Sony Corp., had challenged the rules,
arguing that the FCC lacked the authority to impose such a
requirement.
The U.S. Court of Appeals for the District of Columbia found that the FCC
had the authority and "reasonably determined" that requiring TV
manufacturers to phase in digital tuners would increase production and
lower costs.
*******************************
New York Times
October 29, 2003
Web Group Backs Microsoft in Patent Suit
By STEVE LOHR
A leading Internet standards-setting organization took the unusual step
yesterday of urging the director of the United States Patent and
Trademark Office to invalidate a software patent that the group says
threatens the development of the World Wide Web.
The move by the World Wide Web Consortium puts the group squarely behind
Microsoft in a patent-infringement lawsuit that the company is losing so
far. A federal jury ruled against Microsoft in August and awarded $521
million to a former University of California researcher who holds the
patent the Web consortium now wants revoked.
The Web group contends that the patent based on work done by Michael
Doyle, founder of Eolas Technologies in Chicago, while he was an adjunct
professor at the University of California at San Francisco, was
improperly granted. In a filing with the patent office, the Web
consortium asserts that the ideas in the Eolas patent had previously been
published as prior art, a legal term. That prior art was not considered
when the patent was granted, or in the Microsoft trial, and thus the
patent claims should be invalidated, the consortium contends.
In a long letter yesterday, Tim Berners-Lee, the consortium director, who
created the basic software standards for the Web, said the patent office
should begin a review of the patent "to prevent substantial economic
and technical damage to the operation of the World Wide
Web."
In his letter to James E. Rogan, director of the patent office, Mr.
Berners-Lee repeatedly emphasized the wider public interest in a review
of the patent. If the claims in the patent are upheld and enforced, Mr.
Berners-Lee warned, "the cycle of innovation on the Web would be
substantially retarded." Later, he wrote that the patent, if
unchallenged, represented "a substantial setback for global
interoperability and the success of the open Web."
The technology in question lets a Web browser summon programs
automatically over the Internet. The programs that use this technology
include those for playing music, videos and animations and exchanging
documents over the Internet. The technology has become a standard feature
in the software for coding Web pages, called hypertext markup
language.
To comply with the court ruling, Microsoft has told several software
companies and the Web consortium that it plans to make changes in its
Internet Explorer browser, the on-ramp to the Web for 90 percent of
computer users. That, the Web consortium warned, could force changes in
other Internet media software including the Real Networks music player,
Apple's QuickTime video program, Macromedia Flash, Adobe's document
reader, and Web scripting languages like Sun Microsystems' Java. In
addition, the standards group said, Web pages across the Internet might
have to be modified to adjust to changes made by Microsoft to comply with
the court ruling.
The Web consortium has representatives from many technology companies,
including competitors of Microsoft. But after discussions among the
consortium members, the group agreed that there was an overriding broader
interest in challenging the patent, thus helping Microsoft.
"There was a real recognition that the issues here go way beyond one
company losing a lot of money in a lawsuit," said Daniel J.
Weitzner, director for technology and society activities at the Web
consortium. "And we really are persuaded that the patent is
invalid."
In the trial, Microsoft did claim that there was prior art that
undermined the claims of the Eolas patent. But in its filing, the Web
consortium offers different examples including pre-Internet era software
like Write, a word-processing program included with the Windows 3.1
operating system, which included software for summoning and displaying
other programs. That, the standards group said, is the same basic
function and idea described in the Eolas patent.
A spokesman for Microsoft, Lou Gellos, said Microsoft had not seen the
Web consortium's filing. "It's news to us," he said.
The lawyers representing Eolas and Mr. Doyle could not be reached for
comment yesterday evening.
*******************************
CNET News.com
Orbitz investigates security breach
Last modified: October 28, 2003, 6:35 PM PST
By Alorie Gilbert
Staff Writer, CNET News.com
Online travel agency Orbitz has notified law enforcement authorities
about a recent security breach that has resulted in its customers' e-mail
addresses falling into the hands of spammers, an Orbitz representative
confirmed Tuesday.
"A small number of customers have informed us that they have
received spam or junk e-mail from an unknown party that apparently used
unauthorized and/or illegal means to obtain their e-mail addresses used
with Orbitz," spokeswoman Carol Jouzaitis said in a statement.
"There is no evidence that customer password or account information
has been compromised."
Orbitz found no indication that credit card information had been
compromised, Jouzaitis added.
Orbitz became aware of the problem "in the last day or so,"
Jouzaitis said.
The Chicago-based company has informed the FBI of the information leak
and has launched its own internal investigation with a team of security
experts, said Jouzaitis.
"We will aggressively pursue all individuals who may have been
involved," Jouzaitis said in her statement. She declined to provide
any further information on the nature of the breach.
Orbitz' privacy policy states that the company does not disclose
customers' personal information, including e-mail addresses, to
third-party advertisers unless customers authorize it to do so. The
company says that permission process is separate from any permissions
customers provide during the registration process.
One CNET News.com reader said spam messages began trickling in on Sunday
to an e-mail address that the reader had given only to Orbitz. The
offending e-mail was completely unrelated to Orbitz or airline travel,
the reader said.
"I did not give them permission to share my personal data, and I did
opt out of receiving their ads during the registration process, as I
always do," said the reader, who wished to remain anonymous.
"Plus, they already admitted in their e-mails to me that they are
aware that there was a problem and that my info should not have been
divulged--now the question is: What happened and how severe of a problem
is it?"
Several other apparent Orbitz members aired similar complaints about
Orbitz and spam on Google's Usenet discussion forum and on the
BroadbandReports.com discussion board on Monday.
*******************************
Federal Computer Week
Justice renews Web use monitor
BY Sara Michael
Oct. 28, 2003
The Justice Department will continue to monitor employee Internet use
with Wavecrest Computing's Cyfin Reporter software.
For the second year, DOJ officials will use the software to try to stop
misuse of the Internet by the department's 100,000 users. Justice first
purchased the software in 2002 through a General Services Administration
schedule. The renewal cost the department $36,000, according to the
company.
Wavecrest monitors Internet use and automatically tracks compliance with
the organization's policy. The software creates categorized reports on
Web use by user, group or entire organization, the company
said.
"DOJ set rigorous standards for accuracy, performance and
scalability in an Internet monitoring software product," said Dennis
McCabe, Wavecrest's vice president of business development. "We're
very pleased to have implemented Cyfin so successfully."
Wavecrest is based in Melbourne, Fla., and the Internet monitoring
software is currently installed in more than 2,000 businesses and
government organizations worldwide, according to the company.
*******************************
Government Executive
October 28, 2003
Officials unveil first phase of foreign visitor tracking system
By Shane Harris
sharris@xxxxxxxxxxx
Homeland Security Department officials Tuesday unveiled the first phase
of a massive new immigration system to track the comings and goings of
millions of annual visitors to the United States.
Asa Hutchinson, Homeland Security undersecretary for border and
transportation security, said at a press conference in Washington that
the new system represents an ?historic leap forward? in U.S. immigration
enforcement and national security.
Beginning Jan. 5, the program, known as US VISIT, will begin operating at
115 U.S. airports and 14 seaports, Hutchinson said. Foreign visitors will
be required to submit two electronic copies of their fingerprints as well
as a digital photo of their face. This information will be collected by
immigration inspectors during the routine interviews all visitors undergo
when they arrive at U.S. ports of entry.
Homeland Security officials staged a mock demonstration of an interview
to show how taking fingerprints and a photograph would add only seconds
to the clearance process. The department will use collection systems that
are in place now, and will hand over expansion of VISIT next year to a
contractor. Hutchinson said requests for proposals would be issued in
November.
While collecting fingerprints and photographs, known as biometrics,
represents a significant step forward for immigration control, the
version of VISIT officials demonstrated doesn?t approximate what the full
program will look like. The system still cannot search all terrorist
suspect watch lists maintained by several intelligence and law
enforcement agencies. Jim Williams, VISIT?s program director, said that
Homeland Security currently receives electronic ?downloads? of watchlists
from the FBI, but only occasionally.
Lawmakers and the General Accounting Office have criticized the
department for not integrating terrorist watch lists into one repository.
Homeland Security officials had said they would accomplish that task
within the first 100 days of the department?s official opening, which
took place in January, but they haven?t done so yet.
Williams downplayed Homeland Security?s role in that effort. ?Frankly,
we?re a customer of that? watch list data, he said, adding that the
department needs to do a better job of getting watch lists from the FBI
more frequently.
Hutchinson stressed a number of times that VISIT would be designed to
?facilitate? the entry of people into the country. ?The United States
wants to continue to be a welcoming nation,? he said.
A number of groups, particularly in the transportation and shipping
industries, are concerned that the extra time it takes to process
visitors could back up immigration lines for miles at the U.S. borders
with Canada and Mexico. Hutchinson said the department is ?committed . .
. to not increasing the wait times dramatically.? VISIT must be deployed
at the 50 busiest land border crossings next year, and by 2005 it must be
operating at every port of entryair, sea and land.
Hutchinson said training of federal employees on how to use the first
phase of VISIT will begin next month at Atlanta?s Hartsfield
International Airport. He noted that although the law requires the
program be in place by Dec. 31 of this year, it wouldn?t start operating
until Jan. 5. Hutchinson said airline industry groups complained that
launching VISIT at the height of the holiday travel season would be
overly burdensome.
Congress appropriated $330 million for the VISIT program for fiscal 2004,
about $50 million less than for fiscal 2003. Hutchinson said he was
?disappointed? that lawmakers didn?t meet President Bush?s full $400
million request.
Williams, the VISIT director, declined to specify how much the system
could ultimately cost. He said that in addition to proposing how to build
the system, companies that bid on the program would submit a ?funding
profile.? Officials are turning to industry to design, build and manage
VISIT because they are so saddled with the administrative tasks of
forming the new department.
Exit processing, the other half of the VISIT coin, will be phased in
beginning next year, Hutchinson said. Rather than submit to an exit
interview, travelers will be able to check out of the country at an
electronic kiosk. The exit confirmation will be added to the visitor?s
record, and will help Homeland Security officials keep track of people
who have overstayed their visas, he said.
Exit procedures will be in place at as many as 10 major airports and at
least one seaport by early 2004.
Also, by Oct. 26, 2004, countries that are permitted to waive visa
requirements for their citizens must certify that they are able to issue
machine-readable passports that incorporate biometrics. That requirement
was instituted as part of the USA Patriot Act, signed into law after the
Sept. 11 terrorist attacks.
*******************************
Computerworld
Hackers get novel defense: The computer did it
Legal experts said the argument could become more widespread
Story by Elinor Mills Abreu
OCTOBER 28, 2003 ( REUTERS ) - Prosecutors looking to throw the book at
accused computer hackers have come across a legal defense that could
become even more widespread in an era of hijacked PCs and laptops: The
computer did it.
In one case that was seen as a bellwether by computer security experts,
Aaron Caffrey, 19, was acquitted on Oct. 17 in the U.K. on charges of
hacking into the computer system of the Houston Pilots, an independent
contractor for the port of Houston, Texas, in September 2001 (see story).
Caffrey was charged with breaking into the system and crippling the
server that provides scheduling information for all ships entering the
world's sixth-largest port.
Although authorities traced the hack back to Caffrey's computer, he said
that someone must have remotely planted a program, or Trojan, onto the
computer and that the program could have been designed to self destruct.
In two other cases, British men were accused of downloading child
pornography but their attorneys successfully argued that Trojan programs
found on their computers were to blame.
In all three cases, no one has suggested that the verdicts were anything
other than correct.
Some legal and security experts say the Trojan defense is a valid one
because computer hijacking occurs all the time and savvy hackers can
easily cover their tracks. "I've seen cases where there is a similar
defense, and it could work or not work based on corroborating
evidence," such as how technical the defendant is, said Jennifer
Stisa Granick, clinical director of the Stanford Law School's Center for
Internet and Society.
It's relatively easy to trace a hack back to a particular computer, but
proving that a specific person committed the crime is much more
difficult, she said.
Someone other than the computer owner could use the machine, either by
gaining physical access or by remotely installing Trojan software via an
e-mail or a download from a malicious Web site, security experts
said.
"On the one hand, this is 100% correct that you cannot make that
jump from computer to keyboard to person," said Bruce Schneier,
chief technology officer at Counterpane Internet Security Inc. in
Cupertino, Calif. "On the other hand, this defense could [be used]
to acquit everybody. It makes prosecuting the guilty harder, but that's a
good thing."
Mark Rasch, former head of the U.S. Department of Justice's computer
crime unit, agreed. "The more difficult problem is people could
actually go to jail for something they didn't do" as a result of
Trojan programs, said Rasch, chief security counsel for computer security
provider Solutionary Inc. in Omaha. "If I want to do something
illegal, I want to do it on someone else's machine."
But Dave Morrell, a computer consultant for the Houston Pilots who worked
with the FBI after the attack, said the defense also opens the door to
hackers. "It sets a precedent now in the judicial system where a
hacker can just claim somebody took over his computer, the program
vanished, and he's free and clear," he said.
Michael Allison, CEO of computer forensics firm Internet Crimes Group
Inc. in Princeton, N.J., said experts should have been able to prove
whether there had been a Trojan on the computer in question. "In
some cases, I do suspect there are people whose computer is taken over by
third parties," he said. "It's also a clever defense to
exculpate your client."
The defense is likely to become more widespread, especially given the
increasing use of "spyware" programs that can be used to steal
passwords and essentially eavesdrop on a computer user. "The
emergence of spyware will only enhance these claims," said Michael
Geist, a law professor at the University of Ottawa Law School.
"We're going to have to sort through the level of responsibility a
person has for operating their own computer."
The Trojan defense has not yet been put to the test in the U.S.
Bernhard Warner of Reuters contributed to this report.
*******************************
Washington Post
Outburst From Sun Headed For Earth
Power and Phones May Be Disrupted
By Kathy Sawyer
Wednesday, October 29, 2003; Page A03
One of the strongest geomagnetic storms in years will hit Earth today at
midday with potentially disruptive effects on spacecraft, satellite
communications, electrical power grids and pipelines, according to space
weather forecasters and solar scientists.
A gigantic solar flare exploded from a sunspot on the sun's surface
yesterday at 5:54 a.m. EST, blasting energy and matter into space and
sending billions of tons of hot gas and charged particles straight toward
Earth at almost 5 million mph.
When the storm gets here, it will cause a rapid global change in the
magnetic field, scientists said, setting the stage for effects ranging
from possible power grid shutdowns to cell phone outages and dazzling
displays of northern lights in the skies farther south than
usual.
Larry Combs of the National Oceanic and Atmospheric Administration's
Space Environment Center in Boulder, Colo., said the geomagnetic storm
will be much more severe than two others that reached Earth in the last
five days.
The storm, which will likely last 18 to 24 hours, will periodically reach
the highest level on NOAA's space weather scale, Combs said in a
telephone interview.
The solar outbursts have already caused a series of radio blackouts,
including a pronounced one yesterday morning that resulted from what one
scientist called "the strongest flare we've seen in the past 30
years." The blackouts, which primarily affect aircraft traveling at
far northern or southern latitudes, could continue for weeks, scientists
said.
The solar eruption is "headed straight for us like a freight
train," said John Kohl, a solar astrophysicist at the
Harvard-Smithsonian Center for Astrophysics in Cambridge, Mass. Two
similar eruptions -- known as coronal mass ejections -- that swept past
Earth in recent days "hit with only a glancing blow."
Managers of satellites and utilities were taking protective actions to
mitigate possible power surges.
Solar scientists warned that emergency personnel fighting wildfires in
California should prepare for potential communications disruptions.
Because the fires have damaged many microwave antennas on the ground,
they said, satellite communications have become crucial to the emergency
effort.
During periods when the orbit of the international space station exposes
it to the highest levels of radiation, NASA has directed the two crewmen
aboard to stay in the back of a Russian module where shielding is
thickest, NASA spokesman Kyle Herring said.
Both pieces of onboard equipment used to measure radiation doses to the
astronauts' bodies inside the station failed months ago, and there are
problems with other types of radiation detectors, according to NASA
officials responsible for crew health.
Herring said, however, there are other ways to measure the radiation
levels remotely.
If the crew took no action to protect itself, he said, it would
experience in 20 minutes the amount of radiation it normally gets over 24
hours. As it is, crew members "will experience slightly higher
levels, but the precautions minimize those risks," Herring
said.
The Air Force Space Command in Colorado, which manages U.S. military
space assets, was monitoring the situation but expected no more than
minor disruptions, said spokeswoman Jenna McMullin. "Our satellites
are engineered with radiation shielding," McMullin said.
Depending on the severity of the storm, she added, "some operators
might be putting their satellites in a 'stow' mode, " to minimize
damage.
Some research satellites or detectors that monitor the sun's activity
were shut down yesterday to protect them, scientists said.
In a Category 5 geomagnetic storm, the following effects are possible,
according to NOAA:
? Some power grid systems may shut down or experience blackouts.
? Spacecraft "may be rendered useless" because of damage to
memory devices or other systems.
? Passengers in aircraft at high latitudes could be exposed to radiation
equal to about 100 chest X-rays.
To assess a solar eruption, scientists measure several variables, Kohl
said in a telephone interview. These include the intensity of the
high-energy X-rays that reach Earth almost immediately and which
yesterday caused the radio blackouts; and the characteristics of the
cloud of lower-energy charged particles, which will arrive today. The
power of the storm also depends on conditions such as the relative
orientation of the two colliding magnetic fields.
Particles from the sun typically are funneled down into the atmosphere
along the lines of Earth's magnetic field at each of the poles, creating
the auroras.
The effects of a solar storm on the machinery of civilization result from
the sudden change as Earth's magnetic field suddenly gains strength from
the one arriving from the sun, Kohl said. This induces an electrical
voltage surge on a global scale. Any conductor -- such as a power grid or
a pipeline -- lying in this altered magnetic field can experience a surge
in current.
Scientists are comparing the coming storm to a 1989 event that set off
radiation alarms aboard the supersonic Concorde in flight, damaged
orbiting satellites, caused a nine-hour power blackout in most of
Canada's Quebec province, damaged transformers as far south as New Jersey
and sent the northern lights shimmering as far south as the Florida
Keys.
*******************************
USA Today
Government unveils system to check identities of foreign visitors
By Suzanne Gamboa, Associated Press
WASHINGTON The public got its first look Tuesday at fingerprinting
and photo equipment that will be installed at 115 airports and 14
seaports to check identities of millions of foreign visitors.
The equipment, which goes into use Jan. 5, will allow inspectors to check
identities of visitors against those on terrorist watch lists.
"This gives us the ability to know those who would violate a visa or
overstay a visa," said Asa Hutchinson, undersecretary for Border and
Transportation Security in Homeland Security.
A General Accounting Office report issued last month called the system
"a very risky endeavor" with daunting goals, likely high costs
and details that had yet to be worked out. The GAO said the system could
lead to long lines at ports of entry.
But Hutchinson said it will add only a few minutes to the inspection of a
traveler while significantly enhancing national security.
Travel industry groups have voiced concern in the past that the system
could hurt the industry. Members of the Travel Industry Association of
America were meeting with Hutchinson about the new system Tuesday.
"It has to be effective and in fact improve security and it has to
do it without adding a really onerous burden to travelers to the United
States," said Dexter Koehl, an association spokesman.
The system consists of a small box that digitally scans fingerprints and
a spherical computer camera that snaps pictures. It will be used for the
estimated 24 million foreigners traveling on tourist, business and
student visas who enter through an airport or seaport.
Fifteen of the 19 Sept. 11, 2001, hijackers entered the United States
legally on travel visas. Three were admitted with business visas. The
19th entered on a student visa. At least three of the hijackers had
expired visas.
The new system will gradually phase out a paper-based system that
Congress mandated be modernized following the attacks.
The "exit" portion of the system to ensure visitors leave when
required still is being developed, but officials showed off an electronic
kiosk, much like those used to dispense e-tickets at airports. The kiosk
would allow foreigners to scan documents and provide fingerprints as they
leave.
A person whose fingerprints or photos raise questions would not be turned
away automatically. The visa holder would be sent to secondary inspection
for further questions and checks. False hits on the system have been less
than 0.1%, officials said.
Training on the system and a tryout will begin next month at the Atlanta
airport. Originally, the system was scheduled to begin operation Jan. 1,
but Hutchinson said its debut was delayed to avoid the busy holiday
travel period, a decision made after consultation with industry groups.
Congress provided $368 million to produce the system and put it in
airports, but only provided $330 million of the $400 million President
Bush requested to put the system in land borders in 2004.
Hutchinson said the lower appropriation could affect meeting deadlines
for next year. He said he does not anticipate a user fee like the $100
foreign students may pay to cover the costs of a student tracking
system.
*******************************
New York Times
October 27, 2003
Brazil Becomes a Cybercrime Lab
By TONY SMITH
SÃO PAULO, Brazil, Oct. 26 - With a told-you-so grin, Marcos Flávio
Assunção reads out four digits - an Internet banking password - that he
has just intercepted as a reporter communicates via laptop with a bank's
supposedly secure Web site.
"It wouldn't matter if you were on the other side of the world in
Malaysia," said Mr. Assunção, a confident 22-year-old. "I could
still steal your password."
While impressive, Mr. Assunção's hacking talents are hardly unique in
Brazil, where organized crime is rife and laws to prevent digital crime
are few and largely ineffective. The country is becoming a laboratory for
cybercrime, with hackers - able to collaborate with relative impunity -
specializing in identity and data theft, credit card fraud and piracy, as
well as online vandalism.
"Most of us are hackers, not crackers; good guys just doing it for
the challenge, not criminals," Mr. Assunção said. He insisted that
he had never put his talents to criminal use, although he acknowledged
that at age 14 he once took down an Internet service provider for a
weekend after arguing with its owner.
Across the globe, hackers like to classify themselves as white hats (the
good guys) or black hats (the bad guys), said one Brazilian expert,
Alessio Fon Melozo, the editorial director of Digerati, which publishes a
hacker magazine, H4ck3r: The Magazine of the Digital Underworld.
"Here in Brazil, though, there are just various shades of
gray," Mr. Melozo said.
Mr. Assunção has created a security software program for his employer,
Defnet, a small Internet consultant in São Paulo.
The software uses a honey-pot system that can lure and monitor intruders
in real time. It also uses techniques to foil "man in the
middle" imposters who try to disguise their computers as those of
banks or other secure sites. So far, Mr. Assunção has been unable to get
an appointment with his target customers: security executives at major
banks.
"They say they have their own security and prefer to turn a blind
eye," he said. "But Brazilian hackers are known for our
creativity. If things go on like this, there'll be no more bank holdups
with guns. All robberies will be done over the Net."
For the last two years at least, Brazil has been the most active base for
Internet ne'er-do-wells, according to mi2g Intelligence Unit, a digital
risk consulting firm in London.
Last year, the world's 10 most active groups of Internet vandals and
criminals were Brazilian, according to mi2g, and included syndicates with
names like Breaking Your Security, Virtual Hell and Rooting Your Admin.
So far this year, nearly 96,000 overt Internet attacks - ones that are
reported, validated or witnessed - have been traced to Brazil. That was
more than six times the number of attacks traced to the runner-up,
Turkey, mi2g reported last month.
Already overburdened in their fight to contain violent crime in cities
like São Paulo, Rio de Janeiro and Brasília, police officials are finding
it difficult to keep pace with hacker syndicates.
The 20 officers working for the electronic crime division of the São
Paulo police catch about 40 cybercrooks a month. But those criminals
account for but a fraction of the "notorious and ever
increasing" number of cybercrimes in São Paulo, Brazil's economic
capital, said Ronaldo Tossunian, the department's deputy
commissioner.
The São Paulo department's effort is not helped by vague legislation
dating back to 1988, well before most Brazilians had even heard of the
Internet. Under that law, police officers cannot arrest a hacker merely
for breaking into a site, or even distributing a software virus, unless
they can prove the action resulted in the commission of a crime.
So even after police investigators identified an 18-year-old hacker in
Rio de Janeiro, they had to track him for seven months and find evidence
that he had actually stolen money from several credit card companies
before they could pounce.
"We don't have the specific legislation for these crimes like they
do in America and Europe," Mr. Tossunian said. "Just breaking
in isn't enough to make an arrest, which means there's no
deterrent."
In addition, analysts say many businesses, including banks, have been
slow to grasp, or refuse to acknowledge, how serious the problem is.
Banco Itaú, one of Brazil's largest private banks and the institution
from whose site Mr. Assunção filched the password during his
demonstration, declined to make someone available to comment.
Fabrício Martins, the chief security officer at Nexxy Capital Group, a
top provider of Web sites for e-commerce companies, said, "Most
businesses here don't take precautions until something bad happens that
obliges them to take action."
Mr. Martins, for example, first reinforced Nexxy's security software
after e-mail addresses of online clients were stolen two years ago. Now
his is one of 20 software programs for credit card clearing approved by
Visa International in Brazil.
Why are Brazil's hackers so strong and resourceful? Because they have
little to fear legally, Mr. Assunção said, adding that hackers here are
sociable and share more information than hackers in developed countries.
"It's a cultural thing," he said. "I don't see American
hackers as willing to share information among themselves."
Though the expense of owning a computer is prohibitive for most people in
this country, where the average wage is less than $300 a month, getting
information about hacking is simple. H4ck3r magazine, available at
newsstands across the country, sells about 20,000 copies a
month.
Mr. Melozo, the editorial director, rejects any suggestion that H4ck3r
teaches Brazilians to commit cybercrime.
"It is a very fine line, I know," he said. "But what
guides us is the principle of informing, educating our readers in a
responsible way."
*******************************