[ISN] Mitnick sequel fails to hack it

From: InfoSec News (isn@private)
Date: Tue Mar 29 2005 - 22:37:25 PST


[ http://www.amazon.com/exec/obidos/ASIN/0764569597/c4iorg  - WK]

By Charles Arthur
29th March 2005 

Book review Sequels are hard. Just ask John Travolta, currently being 
panned by the critics for his efforts in Be Cool, the would-be 
follow-up to the tremendously successful film Get Shorty. In books, as 
in films and music, following instant success is often harder than 
achieving it, because the former may be the labour of years but the 
latter has to be built from what's immediately available. Thus one can 
imagine the challenge Kevin Mitnick, and his co-author (and already 
published author) William D. Simon, faced after the plaudits showered 
on their first product, the 2002 book The Art Of Deception.

We need not go over the merits of that book (though you can read them
up)[1]. Suffice to say they were many, principally because it focussed
on social engineering - the technique of getting your victims to help
you to break in, rather than sitting whey-faced in a darkened room
staring at a screen running Netstat. Social engineering is really,
really hard to defend against, because you can't just plug in
something and feel safe. It's about people, and people can be
persuaded to do and say almost anything.

But Mitnick clearly poured much of his life experiences before prison 
into that book. Now he's a security consultant, whose clients would 
likely be unhappy about having exploits or weaknesses broadcast to the 
world. So what to do when the publishers suggest a followup? And what 
to call it?

The solution: pull together tales from other hackers of how they did 
what they did, and call it something similar to the first book - 
specifically, The Art of Intrusion (subtitled 'The Real Stories Behind 
the Exploits of Hackers, Intruders & Deceivers').

Thus the first chapter describes how a team of clever programmers set 
out to empty the computer-controlled poker-playing machines in Las 
Vegas by working out how the underlying code worked, and thus a 
winning hand was on the way. It's Ocean's Eleven sans George Clooney, 
Julia Roberts, and swish locations; instead there's firmware 
reverse-engineering and miniature computers concealed in shoes. But 
the team made a million, at least, and weren't caught.

The next chapter is the tale of some hackers who may, or may not, have 
been encouraged by a terrorist - from al-Q'aeda? - to download details 
from Boeing, and break into the White House website. The hackers got 
busted; but what's not clear is whether the person who urged them on 
truly was a Pakistani terrorist, or an FBI plant to smoke out disloyal 
(or just dumb) hackers, or perhaps a double agent.

It was around this point I got that 'sequel discomfort'. Whereas Art
of Deception had a simple theme - how social engineering gets around
your computer defences - Art of Intrusion is less sure of its ground.  
Is it about hacking? But there's plenty of stuff out there, from
Clifford Stoll's The Cuckoo's Egg [2] onwards, about that. This didn't
have the tidiness of the first book; like real life, it had too many
loose ends and uncertainty.

My unease continued with the story of some prisoners who had been
allowed to get almost unlimited use of computers while inside a US
state prison, and the trailing of a hacker through Boeing (again), and
the saga of Adrian Lamo [3], the "Robin Hood hacker" who got hit hard
by the FBI when he was found to have - gasp - hacked into the New York
Times and even done some unauthorised Lexis/Nexis searches, as well as
- shock! - cheekily added his name to the list of op-ed ("leader
page", in the UK) contributors.

The stories are diverting enough, but what do they tell us? Mitnick 
does make the useful point that the charges hackers face often bear 
little relation to the actual damage or cost done; in Lamo's case, he 
was charged among other things with making $300,000 worth of 
Lexis/Nexis searches via his intrusion to the NYT. But as Mitnick 
notes, the NYT pays a monthly fee for unlimited Lexis/Nexis searches, 
so Lamo didn't cost a penny extra.

The injustice of hacking charges, while being a perennial Mitnick 
bonnet-bee, is however hardly a theme on which to hang a whole book. 
Only towards the end does a message emerge, and even then I'm not sure 
it's quite what Mitnick intended. Chapter 8 details how one lone 
hacker broke into a film software company and stole its latest 
product's source code. Doing so took months, or years; he then posted 
the code to one of the underground warez sites. To what end? None, 
really, since only a specialist could use the program, and would need 
very powerful machines to create anything usable. The next chapter 
describes a team who, for fun, hacked the mobile system used by a 
security company which ferries around prisoners and large amounts of 
money (not in the same van). Having cracked it, what did they do? 
Nothing - and they didn't tell the company either.

The nihilism of hacking is thus laid bare. Unless it's tied to the 
task of protecting people and what they do against real criminals, 
then hacking here lies exposed as a pointless activity, as useful as 
kicking in the windows of bus shelters; it keeps glaziers employed, 
but is a disservice to most everyone else. I'm pretty sure that's not 
the message Mitnick intended. Although there's no sense that he 
delights in what hackers do, he doesn't question the ethics or sense 
in stealing a program that few can use to distribute for underground 

The point that is made, again and again, is that hackers will find a 
way in if one exists, and that any sort of communication will somehow 
be compromised. Against determined hackers, the gods themselves 
contend in vain.

Yes, you should read this if you're nominally in charge of the 
security of a company system where you value any of your information. 
The "tips" at the end of each chapter might offer some assistance, but 
they're less useful than those in the first book.

More helpful would be to show a couple of the chapters - particularly 
Chapter 8 - to whoever holds the purse-strings for your company's 
computer security. It'll either prompt a huge boost in the budget, or 
a 100 per cent cut, on the basis that there's no point protecting 
against obsessives.

Then again, you could follow the example of one systems manager who 
asked Lamo to show him the weaknesses in the system. As Lamo tells it, 
"They said to me, 'How would you secure this machine?' I pulled out my 
pocketknife, one of those snazzy one-handed little openers. And I just 
went ahead and cut the cable and said, 'Now the machine's secure.'

"They said 'That's good enough.' The engineer wrote out a note and 
pasted it to the machine. The note said, 'Do not reattach'."

I'd like to think it'll be a while before Mitnick reattaches to the 
task of writing about hacking. He has a unique perspective, and in 
Simon, a powerful co-writer. But the problem (and at the criminal end, 
it's a severe one) needs a mature outlook. Mitnick helps us get inside 
the minds of hackers. But he needs to get them to see outside their 
heads too - and realise their actions don't exist in an ethical 
vacuum. That will be what musicians call "the difficult third one". If 
I were his publishers, I wouldn't be pushing too hard for it just yet. 

The Art of Intrusion by Kevin Mitnick and William Simon, publ Wiley, 
ISBN 0-7645-6959-7

[1] http://www.theregister.co.uk/2003/01/13/kevin_mitnicks_lost_bio/
[2] http://www.amazon.com/exec/obidos/ASIN/0743411463/c4iorg
[3] http://en.wikipedia.org/wiki/Adrian_Lamo

Network Security - http://www.auditmypc.com
Free vulnerability test - How secure is your computer?

This archive was generated by hypermail 2.1.3 : Wed Mar 30 2005 - 14:07:49 PST