Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security Editorial

Mitnick: Security Not about Technology 387

renai42 writes "Companies eager to tighten up their information security perimeters should focus not on technology but on teaching their employees how to say 'no', ex-hacker done good Kevin Mitnick told a full house at Toshiba's MobileXchange conference in Melbourne yesterday. 'We can't expect our employees to be human lie detectors,' Mitnick said. 'One of the most difficult challenges in corporate cultures is getting people to modify their politeness norms.'"
This discussion has been archived. No new comments can be posted.

Mitnick: Security Not about Technology

Comments Filter:
  • by carninja ( 792514 ) on Friday March 04, 2005 @12:59AM (#11841621)
    Just say NO!
  • FREE KEVIN! (Score:5, Funny)

    by Anonymous Coward on Friday March 04, 2005 @12:59AM (#11841624)
    oh wait..nevermind..its 2005
  • How is this news? (Score:4, Interesting)

    by Anonymous Coward on Friday March 04, 2005 @01:03AM (#11841649)
    Isn't this what (ex)hackers have been telling the IT industry all along?
    • by rjordan ( 640052 )
      More specifically this is what Mitnick has been telling people all along - I seem to read about him saying this regularly....
      • Comment removed (Score:5, Interesting)

        by account_deleted ( 4530225 ) on Friday March 04, 2005 @01:12AM (#11841695)
        Comment removed based on user account deletion
        • If you need to log in, crack the password yourself first :P
        • by Anonymous Coward on Friday March 04, 2005 @01:57AM (#11841898)
          I don't really believe that most people are dumb. Most people just want to do their job, whatever it is, and they think that it is up to YOU to prevent people from "hacking the system." In their mind if something goes wrong, it's YOUR fault.

          The biggest problem is that people's views are flawed, they need to be told WHY they shouldn't give their passwords out. Rather than saying, "I won't ever ask for your password, don't give it out," say something like, "there are these people who use social engineering..." etc...

          Will this prevent social engineering attacks? No, but it WILL help to prevent them. People won't do what they are told if they don't know why they shouldn't do it, regardless of the profession (is that enough double negatives?)

          But what do I know, I'm just Anonymous Coward.
          • Re:How is this news? (Score:3, Interesting)

            by bampot ( 814270 )
            It is against Company Policy here (very large multi-national company) to divulge your password, even if for critical busines issues. Employees are expected to log a call with the service desk for a reset. Working in the middle of the night on a critical project? Tough - you should have arranged on-call support.

            Divulging a password is a disciplinary offence too, but it still happens regulary - mostly because it's rarely enforced.

            Here are some random office rules that are obeyed without question, these are
          • Re:How is this news? (Score:3, Interesting)

            by Lumpy ( 12016 )
            I don't really believe that most people are dumb.

            Wow! you must be a youngster.

            The average IQ here in the United States is below 100 (around 97 I recall)

            That means on average everyone around you is only 17 tiny points away from being a clinical moron. A good strike to the head can get them there in a hurry.

            I have people that we have had to LOCK DOWN their computer completely with TrustNoEXE because they can not understand what it means when we say "DO NOT DOWNLOAD AND INSTALL ANYTHING". Somehow they i
            • Re:How is this news? (Score:3, Informative)

              by bluGill ( 862 )

              An IQ of 100 is average.

              An IQ test is very reliable in that you will always get close to the same score. However it is worthless because nobody really knows what any particular score means. You can say your IQ is X, but that gives no insight to anything about you.

        • Re:How is this news? (Score:3, Interesting)

          by Errtu76 ( 776778 )
          I remember when i worked at a university, there was some intern (sent out by the IT guys) going by every department, asking people to give up their passwords. This was because of some inventory/migration/bullshit-excuse. I kid you not. I refused to give my password to anyone, saying that if i had to give it up to anyone other than the login screen, it was worthless. What was weird about it, was that apparently i was one of the few who refused to give it. Most people had no problem handing over their 'secret
          • I'm getting tired of all the complaining about passwords and their insecurity. It is hard to change people, and if you don't want them to give away password information, don't give them any. If we can use keys to get into our homes we should be able to use them for authentication as well.
            • by Errtu76 ( 776778 )
              and if you don't want them to give away password information, don't give them any

              Sorry, but that isn't a good solution. In certain cases users have to have a password. We have to teach the users the consequences of giving away their password, and teach them some responsibility. What i always say is: If you give your password to somebody and that somebody uses it for less-than-legal purposes, it will be *your* responsibility. No excuses, no investigation and no second chances. Want to be safe? Don't give
    • by MillionthMonkey ( 240664 ) on Friday March 04, 2005 @01:12AM (#11841699)
      Isn't this what (ex)hackers have been telling the IT industry all along?

      As old hackers while away the years (in jail) the industry moves on, which means their skills become dated and they lose all their technical expertise that got them in so much trouble in the first place. So they move on to pretending that all you need to do is act nice and con the receptionist or some fool on the other end of a phone. That route of attack is not as affected by one's weathering technical skills.

      Ring ring
      Hello, this is Bill.
      Bill, hi, this is "Steve". I'm stuck outside the building- this stupid thing won't let me in. Could you read me our private key real quick?
      OK, it's A244C7735ABBFC01... hey, how do I know you're really Steve!
      • Re:How is this news? (Score:5, Interesting)

        by Linker3000 ( 626634 ) on Friday March 04, 2005 @05:13AM (#11842468) Journal
        In my previous job I worked as a trainer and consultant for many blue chip companies and spent a lot of time in their corporate HQs, Call Centres and Help Desks.

        Invariably, front desk security was adequate, but it was easy to get into many Call Centres and Help Desks without a key card, fob or access code simply by waiting for an employee to walk towards the main door and then approaching the same door carrying an abviously heavy, large box full of training manuals - most people in service delivery roles want to be helpful so they often hold the door open for you! In 6 years of consulting I was only ever challenged once.

        In reverse, I would occasionally be coming out of a building and someone would ask me to hold the door because they had forgotten their pass - it would really piss them off when refused to let them in and said if they waited outside I would fetch a team leader or manager for them!
    • It's news because (most of) the industry still isn't listening.
    • Isn't this what (ex)hackers have been telling the IT industry all along?

      Yeah, but for some reason nobody ever believes them, and I think I know why.

      boss: "So, you're a computer geek hacker-type, eh?"

      ex-hacker: "Yes."

      boss: "And what you want to teach us is..."

      ex-hacker: "How to relate to people."

      boss: *laugh* *chortle* *door slam in face*
  • Sure we can... (Score:5, Interesting)

    by Anonymous Coward on Friday March 04, 2005 @01:04AM (#11841655)

    'We can't expect our employees to be human lie detectors,' Mitnick said.

    Sure we can: http://content.monster.com/martynemko/articles/arc hive/lying/ [monster.com]
    • Re:Sure we can... (Score:4, Interesting)

      by jspoon ( 585173 ) on Friday March 04, 2005 @01:29AM (#11841775)
      That's an article that reads like an explanation of why most social engineering is done over the phone.
    • Re:Sure we can... (Score:2, Interesting)

      by Anonymous Coward
      Good anti-lying-detection article for social engineers.

      On another note, it seems that the easiest way to learn to lie is just to subscribe to relitavism. Being able to believe, honestly, that reality is merely the subjective interpretation of the human mind allows one to effectively emulate other realities in one's own mind while speaking, easing the body language. Essentially, you just have to be able to put your conscious mind into the altered reality state while maintaining enough subconscious realizati
  • by Jippy T Flounder ( 819544 ) on Friday March 04, 2005 @01:04AM (#11841656)
    and in other news... "reformed serial rapist teaches women to 'just say no'"
  • by Toloran ( 858954 ) on Friday March 04, 2005 @01:06AM (#11841668)
    I do tech support at my school. My self and two guys finnally finished our new mobile computer lab. Laptops with WiFi cards installed. It makes me sad to think after we get the things nice, clean, working, etc that the idiots will have the things broken beyond recognition by the end of next week. ;_;

    The ultimate security leak, people. >_
  • Please... (Score:4, Insightful)

    by jpiggot ( 800494 ) on Friday March 04, 2005 @01:06AM (#11841671)
    "politeness norms" my ass...

    What employees need to do is follow the very simple instructions they're given. Change your password regularly. Don't make it obvious. Log out of the system when you're done. Don't use the same password at every site you visit. Etc...

    It's simple, Private Pile...if you lock up that jelly doughnut in your footlocker, it's going to make it very hard for people to steal it.

    • Re:Please... (Score:2, Informative)

      by stuffisgood ( 666330 )
      I think what the article is saying is more about social engineering. If companies can teach employees not to fall for social engineering tactics then they can move onto easier to fix things like regularly changed passwords etc.
      • Re:Please... (Score:2, Interesting)

        by jpiggot ( 800494 )
        I get that...but what I'm saying is that the article doesn't address the larger point, which is that teaching employees to do the simple things can probablly prevent 90% of the problems in the first place.

        THEN, you can fix "social engineering"

    • Re:Please... (Score:5, Insightful)

      by tji ( 74570 ) on Friday March 04, 2005 @01:23AM (#11841745)
      > Change your password regularly. Don't make it obvious. Log out of the system when you're done

      That's fine for making general users more secure..

      What he's talking about is more to do with making admin types more skeptical / less polite. The common 'exploits' that Mitnick, and many others, have done is to learn enough about a target company's practices, and talk your way into getting privileges that employees get.

      e.g. call the phone company's internal support line, talk the talk of the phone technician, and get them to change your account, give you information, etc.

      Or, call a corporate support line complaining of problems with your dialup access to the corporate network. Get them to reset "your" password for you, and you're in the network. 99% of the calls they get are legitimate employees, probably with the same old problems. If you sound like one of those normal employees, the support people will work hard to get you access to the network.
    • Re:Please... (Score:5, Informative)

      by Anonymous Coward on Friday March 04, 2005 @01:48AM (#11841863)
      Good grief, changing your password regularly and make it non obvious... this is just such an outdated view that it's almost comical.

      Two immediate issues - sure, the employees computer comes up every 'X' number of days and forces a password change. Most employees alternate between "password A" and "password B" with the only difference being one different letter or number.

      Second issue, the password is forced to be some 8 character password that conforms to a complexity rule that requires letters and numbers, a mix of upper and lower case, and sometimes some non-letter/number characters. These conforming passwords are ones that very few, if any employees can remember so they do what? Write it on a post-it note and stick it on the monitor, under the keyboard, in a drawer, between the pages of the intercompany printed phone book or employee manual or some other 'safe' place that could be determined by an unauthorized person. How do these contribute to increased security??

      Better to break those "politeness norms". You see someone you don't recognize involve them in a conversation. Introduce yourself, ask them about themselves, what they do, who their supervisor is. It's not confrontational, it's non-threatening, and if the person does not seem genuine the questioning employee can make a report to building security with a description. Stop tail-gating at controlled entrances, keep an eye out for co-workers who may forget or seem to be having problems. Respond to unusal requests from outside people by telling the caller you don't have the information handy but can call them back with it within a short time. It also gives time to check with others if the sharing of information is unclear. ALWAYS call back however even if it is to tell the caller that the information cannot be relased. These subtle changes as well as others should foster a culture of security that becomes so second nature to every legitimate employee that the "simple rules" and the threats that accompany non-compliance are no longer the focus.

      I've been promoting and exposing these concepts as an admin and IT Manager since at least the mid 90's.
    • Re:Please... (Score:4, Insightful)

      by Tiamat ( 25392 ) on Friday March 04, 2005 @02:24AM (#11841997)
      We all know that you can 1) force users to change their passwords regularly, or 2) make your password very difficult to guess. Because people tend to remember very few difficult passwords, to require 1) and 2) means that your users are putting post-its on their monitors to remind them (worse than almost-nothing).

      So, forget 1), and make sure that the first pw someone picks is almost impossible to guess, and let them keep it.

    • Re:Please... (Score:5, Insightful)

      by FireFury03 ( 653718 ) <slashdot@NoSPAm.nexusuk.org> on Friday March 04, 2005 @04:27AM (#11842355) Homepage
      Change your password regularly.

      No, most security experts will tell you this is a very stupid thing to require people to do. Your password system should enforce strong passwords anyway. Enforcing strong passwords which have to change every month just encourages people to write them on a post-it and stick it to their monitor because no one can remember passwords that change that regularly unless they're really simple.

      What's more, it doesn't actually do much for the security anyway: if someone hands random people their password then you're pretty much screwed anyway - people aren't going to wait until after the password change to try and use that password. If someone is brute-forcing passwords then they stand the same mathematical chance of hitting the new password as they did with the old password so no more security there. Infact, the only security it gives you is if someone steals your encrypted password file and it's going to take them a few months to crack. But if random people can get the password database then you've got bigger security concerns than weak passwords.
      • Re:Please... (Score:4, Insightful)

        by pedestrian crossing ( 802349 ) on Friday March 04, 2005 @05:04AM (#11842432) Homepage Journal

        Change your password regularly.

        ...

        What's more, it doesn't actually do much for the security anyway: if someone hands random people their password then you're pretty much screwed anyway - people aren't going to wait until after the password change to try and use that password.

        Periodic password changes help limit the window of exploitation.

        That's not to say that you aren't royally screwed in some situations (ie., root password/privelige escalation), but in other situations it can really help limit the damage. You don't ever really know if someone else has your password.

        Password changes exploit the fact that it often takes time to leverage a compromised password into useful exploitation.

        Yes, the users are the primary problem (the point of TFA!).

        It's all about using layered defense to incrementally raise the bar of entry.

  • by Che Guevarra ( 85906 ) on Friday March 04, 2005 @01:07AM (#11841672)
    I'm so sick of this guy's so-called "hacker" fame. He tricked a bunch of early tech no-nothings into telling him their passwords and protocols and now he's living off it forever. Jobs and Woz hacked the phone system, but then they went on to produce something. What has this guy actually ever produced, written, made? Seriously, I don't know and maybe that's a problem. He must have produced something valuable, but I don't know what it is. I'm sure some Slashdot guy will tell me, but isn't it funny that no novice (like me) knows what the hell he's ever done creatively/intellectually in his life?
    • by vhold ( 175219 ) on Friday March 04, 2005 @01:10AM (#11841686)
      What's particularly ironic is that his success mostly stems from getting caught. Had he not failed at the thing he is such an expert on, he'd never have been considered an expert.
      • As I've said to people previously.. Nobody will ever know about the greatest hacker who ever lived. Well, maybe I stole that from somewhere, but meh..
      • not quite (Score:3, Informative)

        He was considered an outstanding hacker before he got caught. They wouldn't have gone after him as mean-spiritedly as they did if he had not hacked circles around the people after him. An undercover agent (who happened to be bald) that was after him found that his private phone numbers had been switched with the number for the hair club for men. Mitnick was a juvenile prankster, but his hacking skills were legendary, and his pranks pissed off a lot of people who ended up wanting to throw the book at him.
    • Well, he tricked a bunch of know-nothings into telling him their passwords and then got rammed in the ass by the government to the point of absurdity.

      Matyrdom sells, ya see.
    • by Anonymous Coward on Friday March 04, 2005 @01:46AM (#11841853)

      You should do a little research grashopper. E.g. Mitnick demonstrated that sequence number attacks were possible with TCP/IP. NOT a small thing.
    • by Candiri ( 704192 ) on Friday March 04, 2005 @01:52AM (#11841876)
      You should read up on the guy. His talent lay more with the social engineering aspect of security. He could talk his way into or out of just about anything. His book on social engineering is a good read, McPaper-sized examples, but still very eye-opening. I'm a network admin, 18 years running, and I wound up with a large security laundry list to discuss with my boss the following Monday.

      The other thing is his *years* of jail time were spent before he was ever convicted, i.e. pleaded guilty to some of the charges to cut short his lack-of-a-speedy trial. He's done his time. He can talk as long as people will pay him.

      Besides, ignorance is not unexpected. Many novices probably couldn't tell you who Philo Farnsworth was, even though they've been looking at his invention all their lives.
    • by Skuld-Chan ( 302449 ) on Friday March 04, 2005 @01:56AM (#11841889)
      Have you read his book? If you have you've discounted a lot of the threat of social engineering. Not only do you have to call someone from an external phone network, but in many cases have to know enough to convince anyone from a secretary, white collar worker or IT professional/system administrator to do your bidding.

      I don't think you give social engineers enough credit - because they have to have the ability to pass off as someone who knows more than you do about your own systems and from what I've read he suceeded rather well at this - not only did he convince people to do what he wanted, but he had enough knowhow to do something with that info. And it does take some knowhow - after all once you gain access to a server, telephone switch, network etc - you have to know enough to change its configuration or access it to get what you want. (actually this sounds like my job - technical support)

      Long before he was ever caught I had read about his exploits in computer magazines and the paper. His capture, and the scadal about his stay in federal prision I think made him famous. He's the only one - aside from those stuck in Guantanomo Bay who have been held without trial.
      • by flyingsquid ( 813711 ) on Friday March 04, 2005 @02:32AM (#11842028)
        The insurgency in Iraq is a good case of how effective the human element is. The guys apparently know pretty much everything that's going on because they have moles and informers in the government, and because they can blackmail and threaten people for information. They just managed to take out a couple of the people in the Hussein trial. Meanwhile, for all their high-tech satellites, unmanned aerial vehicles and NSA technology, the U.S. still can't figure out where the hell Zarqawi is.

        Likewise, the U.S. was able to get intelligence on the Soviets by sending a sub to tap an underwater cable in the Sea of Okhotsk. This cost tens of millions of dollars. For a couple million, the USSR bought off Aldrich Ames and got whatever intel they wanted. All in all, being able to manipulate people is probably a lot more useful and dangerous skill than being able to manipulate technology.

      • You must be kidding. The only thing you've said is that he "tricked" people. And what did he actually do with it? Write his own software? Did he start his own company with the information he stole? No, he did nothing but post and run. He's an icon of shit hackers who do nothing but break networks and passwords. Here's a twenty dollar bill, no wait it's a two dollar bill. There, I've socially engineered you. Feel like you've been hacked?
    • Your a troll, and I'm biting.

      Kevin was arrested for ip spoofing. Do you know what that is? Can you do that? Probably not, so please shut up.
      • Oh, gosh, is that where I send fake header info to a receiving address and hope it will recognize my fake shit and let me into the network?
        • 0100010001100101011000010111001000100000010000010 1 11001101110011011010000110111101101100011001010010 11000010000001110000011011000110010101100001011100 11011001010010000001100101011000010111010000100000 01101101011110010010000001110011011010000110100101 11010000100000011000010110111001100100001000000111 01000110100001100101011011100010000001100100011010 01011001010010111000100000001000000101000000101110 01010011001011100010000000100000010110010110111101 11010101110010001000000110110101101111011011
    • I'm so sick of this guy's so-called "hacker" fame.

      I'm so sick of people here being proud of their ignorance. If you don't know what he's done, isn't it up to you to find out before passing judgement?

      Oh right, it's up to everyone else to do that for you as well.


    • ...so I know what I'm talking about.

      Kevin is intellectually tenacious. If he wants something, usually knowledge about the inner working of something or some secret. His will not give up until he learns what he wants to know.

      What Kevin has produced is a comprehensive disclosure of the techniques and methodologies that people with hyper-curiosity use to get at YOUR secrets.

      Now little man, goto the book store and buy a copy of "The Art of Deception" by Mr. Mitnick (to you) and if you read it through to t
  • ...you can't go wrong with a Mitnick story.
  • C&C (Score:5, Insightful)

    by shannara256 ( 262093 ) on Friday March 04, 2005 @01:09AM (#11841679) Homepage
    As CABAL said in Command & Conquer: Tiberian Sun,

    "The systems are impenetrable. There are no weak points. The technology is without flaw. The Human element, as always, is riddled with imperfection."
  • Social Evolution (Score:4, Insightful)

    by MrAsstastic ( 851637 ) on Friday March 04, 2005 @01:09AM (#11841681)
    This is exactly how things become worse as time goes on. Now regular folks are going to become more rude and less interested in working with you to get things done. Trust me, the sheeple don't know how to defeat social engineering. They are used to fear and terror and will be distrustful of your attempts to get work done. A few can defend against rogue attempts to illicit secure information, but most will just be jerks about it and everybody hurts. More negativity. Well, it's something to work on and I guess that's what we do here on Earth...we work on stuff together. We talk about it on Slashdot, we IM our buddies and send them interesting links. Slowly their minds change to our influence. I found out at an early age how easily I can manipulate good people and it sickens me. I grew up, matured and avoid it at all costs. But it does come with a heavy price. Sometimes it is very hard to deal with good people. Especially stuck down here in my parents basement, looking for light swords and good time travel techniques. Forward into the fray.
  • by jafac ( 1449 ) on Friday March 04, 2005 @01:10AM (#11841688) Homepage
    My employer holds regular training sessions for all employess on computer security, with a strong focus on resistance to social engineering methods. There are also several levels of the training, a basic course for the rank-and-file, a higher level course for those higher-ups and engineers who have to protect subcontractors and customers proprietary data, and a more intense set of courses for the IT and security folks. (We manage both physical and information security).

    Have we had information stolen? Yes. We've had unscrupulous employees go to work for competitors and give them proprietary data, we've had subsidiaries sell controlled technology to foreign powers (and got bitchslapped for it too!).

    Point is, machines are easy to secure. More often than not, theyll protect what you tell them to, especially if you have competent engineers. But the weak link is ALWAYS the human one. The most careful companies can apply careful policy, process, and training, like my employer does, and they can also hire tons of babysitters, big brothers, and such. And the information still flies out the door.
  • by Anonymous Coward
    There seems to be an alarming trend towards insane levels of paranoia, especially here in the US. At the same time there is an unprecedented increase in cases of clinical paranoia and related mental disorders. I wonder if there is any correlation... For sure there are thousands of security related companies doing good business and politicians pushing their agendas.
  • trade off (Score:5, Interesting)

    by delirium of disorder ( 701392 ) on Friday March 04, 2005 @01:13AM (#11841701) Homepage Journal
    Technical or human, good security requires balencing convenience and control. If you give your employies the power to refuse information to potential customers, you gain control and security but loose convience and maybe money. If you tighten your network down so much that users have to jump through hoops to send files to each other, you may be more secure, but the hassle will lead to lost productivity. You can't try to too hard for control or for freedom. You have to weigh threat and risk. You want to ensure against potential disasters, and eliminate any more likely security risks. It's probably too costly to treat a low threat but high risk (common) security hole as if it were a disaster. This is why stores find it cheaper to set prices assuming a certain ammount of shoplifting will occur. It would cost too much in lost sales and increesed labor to secure the store against all theft. Training your dumbass users, helpdesk, and even sysadmins to recognise social engneering, might just cost more then any losses from security breaches.
  • Mitnick (Score:4, Interesting)

    by Stalyn ( 662 ) on Friday March 04, 2005 @01:23AM (#11841748) Homepage Journal
    remember this [2600.com]
    • "Fuck Kevin Mitnick! People like Eric Corley have dedicated
      their whole miserable lives to help "free" guilty Kevin Mitnick.
      The truth of the matter is Eric Corley is a "profiteering glutton",
      using Kevin Mitnick's misfortune for his own personal benefit and
      profit."

      For every cent I make, the govt just is a glutten to make its cut with me.

      Meanwhile they devalue the currency and steal another 4% ontop of the 35% they stole already.

  • by eric31415927 ( 861917 ) on Friday March 04, 2005 @01:23AM (#11841750)
    What do you do with your print outs? Do they wind up in the filing cabinet, the shredder, the recycle bin, the trash? I've seen many people trying to be green by chucking their papers in the big blue recycle bin. I'm sure much of this blue-bin fodder should have been shredded.
    • by Anonymous Coward
      Simple answer is to put a heavy duty cross-cut shredder beside that recycle bin or even better one that reduces documents to something resembling confetti. Certainly some paper waste companies do shred the paper they pick up, sometimes right in the truck they use to pick up the recycling. However for important or sensitive information you should not rely on this "service". Also a company rep, manager, or other person should verify that shredding takes place either by casually visiting the pick-up vehicle
  • by chris_eineke ( 634570 ) on Friday March 04, 2005 @01:33AM (#11841791) Homepage Journal
    "But if you think technology can solve your security problems [...] then you don't understand the problems and you don't understand the technology."
    - Bruce Schneier
  • by nasor ( 690345 ) on Friday March 04, 2005 @01:39AM (#11841817)
    I suspect (but of course can't provide any real evidence) that the vast majority of computer break-ins are by young people who are simply looking for any system to break into, not targeting a specific company. Most 'crackers' probably just pick a known vulnerability and search around for a system that hasn't fixed it yet. They don't particularly care who they break into, so long as they're breaking into somewhere.

    These social engineering attacks that Mitnick has built a career warning people about seem more relevant to situations were the cracker has some very specific goal in mind regarding a specific organization - dedicated industrial spies who want specific information from a particular company, etc. While I'm sure that sort of threat is a concern for many companies, I don't think it's typical of how and why computers usually get hacked into.
  • by Anonymous Coward on Friday March 04, 2005 @01:39AM (#11841819)
    I was part of the "underground" at the same time he was. The people that took chances and did stupid stuff got caught. He fucked up, got caught, and now he's making money lecturing on basics like "teach your employees not to give out a password to a stranger that asks for it." NO SHIT!

    The smart people didn't get busted, and have to work their tails off doing regular sysadmin duties these days.
    • by Idarubicin ( 579475 ) on Friday March 04, 2005 @12:59PM (#11845137) Journal
      The smart people didn't get busted, and have to work their tails off doing regular sysadmin duties these days.

      Right. Smart. Working long hours for low pay, instead of fame, fortune, and easy work. Hm.

      Sounds like Mitnick's still the best at making people do his bidding.

  • by SuperBanana ( 662181 ) on Friday March 04, 2005 @01:42AM (#11841834)
    We can't expect our employees to be human lie detectors,' Mitnick said. 'One of the most difficult challenges in corporate cultures is getting people to modify their politeness norms.

    Mmm...no.

    This is the problem with Mitnick- he's never been inside of the fence. Ever. He's always been peering in from the outside, either as an attacker or a consultant. Unless you work in IT as regular staff, you don't realize the root causes.

    The problem isn't with training people to say no, or to stick to policies. Especially in a medium to large organization, there's little problem getting people to stick to policies if they make sense or aren't an unreasonable impediment to workflow. The word is "bureaucracy", and so often, it's used by lazy people to avoid work.

    Security problems come from three areas:

    • Security policies written by the incompetent
    • Security policies influenced by corporate politics, such as "oh, the controller will complain if his accountants keep having to change their passwords, we share a boss, and he's got a lot of favor with the boss, so I don't want to piss him off" (see above)
    • Security policies so complex or cumbersome, they're ignored or not followed as strictly as necessary (see above)

    Notice a pattern? Security policies written by the incompetent.

    A company I worked at had to comply with Sarbanes-Oxley regulations. This was interpreted to mean that every 90 days, all the employee domain passwords would expire. Because a large portion of the company used Macs (to make a long story short, you can't easily set up a Mac to let users change Active Directory passwords, much less notify the user their PW has expired and "please change it:"), email and file server access would just stop with no warning, and they'd flood help-desk with calls.

    Typical conversation went something like:

    "...and what would you us to change your new password to?"
    "Harry123"
    "Is that family member's name?"
    "Yes, my husband's."
    "Please pick something else."

    This would go on and on. Some of the passwords people wanted consisted of their username plus "123", their first name plus two numbers, etc. Even worse, their initial password was based off their hire date, and most people never bothered to change theirs- so access to any other employee's email for at least the first 90 days was Dumb Shit Easy.

    It's so incredibly stupid- force password changes every 90 days, but no standards for setting passwords...predictable passwords for new employees...no password auditing(ie runs with John the Ripper or similar)...nothing. Just "make all the passwords expire every 90 days." Brilliant. Why couldn't stricter password rules be enforced? Top management decided it would "aggrivate" employees too much, and I was actually told not to stop employees from picking bad passwords.

    • by rve ( 4436 ) on Friday March 04, 2005 @04:23AM (#11842339)
      From my experience in the workplace (100% tech savvy people, it's a software company): On the servers that force users to change their passwords every 90 days, most users use their regular password plus a number, adding exactly nothing to the security.
    • by devonbowen ( 231626 ) on Friday March 04, 2005 @08:26AM (#11843039) Homepage
      Can someone please explain to me what the point of forcing users to change their passwords every 90 days is? I mean, even if it's implemented "correctly".

      On systems where this is not done, I use random strings as passwords. I know it's for long term use so I commit it to memory. On systems where this is done, I use simple patterns because I don't want to forget it while I'm on vacation. It's a dramatic reduction in security in my case and incredibly annoying. I note that many people even write them down to help their memory.

      The only time I can imagine it helping is if someone breaks into your system. It means their time to do damage is limited. But not by much. On a system that requires new passwords every 90 days, I've got an average of 45 days of access before I lose it. 45 days!! Yipee!! Not much I can't do in that amount of time.

      Devon
  • I'll comment more as soon as my 28.8 modem connects. Okay wait... Brrrrr-bzzzzz.zzzzzzz.iiiiiiii.zzzzzzz
  • by jesterzog ( 189797 ) on Friday March 04, 2005 @01:58AM (#11841904) Journal

    Kevin Mitnick is looking at it from companies' points of view right now, but I think the whole problem is really created by some fundamental flaws in software architecture patterns and how most software these days interacts with the users. (Arguably it's as much a fault with the operating systems as everything else.)

    I don't think that there should be that much of a burden put on the user to be responsible for saying yes or no all the time. So much software that's out there today directly bombards the user with so many questions about things that they don't understand, care about, or have time to deal with, that it's not practical for most people to spend so much time caring about what they're being asked.

    Passwords, which Kevin Mitnick also talks about, are an equally bad design. They're there for the convenience of the machine -- not the person using it. Most people aren't mentally capable of remembering and matching lots of different passwords for different services, certainly not if they're supposed to (or forced to) change them every few months. It's no surprise that in order to get their actual work done, people are simply going to resort to predictible patterns or writing down secret information.

    I can set aside the time for dealing with these sorts of things, and I'm sure that many people here can... but then I have more than a passing interest in computers and what's going on inside mine. For many more users out there, a computer is just a tool that's used towards something that's much more interesting to them, and dealing with the tool is one of the last things they want to care about.

    Teaching people to "say no" is certainly part of the equation, but it won't work beyond a certain point. I don't know what the answer is, whether it's reducing the number of options over all software, trying to make more intelligent decisions without asking the user, arranging things so that people's software is generally configured entirely by an administrator who understands the issues, or something else. I think it's important to realise, though, that research about reducing social engineering in software is at least as important to security as researching technical security holes. It's as much of an HCI problem as a security problem.

  • Comment removed (Score:4, Interesting)

    by account_deleted ( 4530225 ) on Friday March 04, 2005 @02:04AM (#11841918)
    Comment removed based on user account deletion
  • I'm surprised. (Score:3, Insightful)

    by Kadmos ( 793363 ) on Friday March 04, 2005 @02:11AM (#11841946)
    Honestly this is very suprising to me. I own and run a small business and people try and scam us all the time. Examples include dodgy telephone directory listings, website hosting, domain hosting, overpriced stock and people just generally phoning us and trying to sell us every piece of crap under the sun. This is not just scammers, it's also local sporting groups, charities, schools, churches etc all seem to think we are here for their sole benifit. It never seems to occur to any of them that we get asked ten times a day to hand over money for no benifit to us. It sounds like I am bitter, but I'm not, this is just reality.

    I don't mind donating, I give time and money every week to several organsisations (of *my* choice), but most of them have never even been a customer before.

    So actually thinking about each and ever deal/agreement I make has become second nature, it's easy to tell when somebody is trying to scam you really. If people start asking intimate questions: "who do you have your telephone with? it's a scam. If they ask "are you the owner of this business" and then ask *another* question about the business it's a scam.

    If they really had anything to do with your business they don't need to ask who you are, because they already know.
  • Politeness norms? What politeness!

    If you want a physically secure company, move to New York or Jersey. You'll never have to deal with pesky politeness again.
  • This is news? (Score:3, Insightful)

    by swordgeek ( 112599 ) on Friday March 04, 2005 @03:46AM (#11842232) Journal
    Is there anything here that hasn't been said better already by Bruce Schnier? For that matter, is there anything here that Mitnick himself didn't already say in his trial?

    People are the weakest link in any security system. This is so well known that it's not even worth talking about, unless you have a new way around it. Kevin, sadly, does not. Training people doesn't work. Not only is your security only as strong as the weakest link in the chain, but it's only as strong as the weakest occurence of that weak link. In other words, unless you can GUARANTEE that 100% of your employees won't be susceptible, training them beyond the obvious (which should be presentable in a half-hour lecture) isn't a useful endeavor.

    Schnier has it right: Protection is only a way of giving yourself more time for the detection and response mechanisms to kick in. You won't ever get a secure system by locking all the doors.
  • Too Much Security (Score:4, Insightful)

    by logicnazi ( 169418 ) <gerdesNO@SPAMinvariant.org> on Friday March 04, 2005 @03:58AM (#11842268) Homepage
    Social engineering is effective quite simply because we have alot of annoying mostly pointless security measures and then real security measures with no good way to tell them apart.

    Look, if the same security policy that tells you not to let *anyone* into the building without a key card tells you not to tell anyone your password you are likely to ignore both. In most buildings there is no good reason not to hold the door for the person behind you but a very good reason not to share your password.

    People aren't computer programs they need not only to be told what policies to follow but which ones are the important ones and which ones are just meant to keep bums from sleeping in the lobby.
  • by chadpnet ( 627771 ) on Friday March 04, 2005 @04:22AM (#11842336) Homepage
    As I clicked on the comments link and expected to find a decent collection of Kevin flames, I knew I'd have to throw my two cents in.

    To the ones that claim that this is old news, or that Kevin isn't as "leet" as many think; I advise to take your comments with a grain of salt. Anyone who has actually read his book, The Art of Deception, will appreciate Kevin's viewpoints. The truly great hackers use a good mix of social and technical engineered tactics to comprise security. I give you the advice is outdated and isn't news, but his advice will always outlast ever-changing technology. As a bonus he gives you open-sourced ;) policy suggestions that would be a nightmare for admins to write themselves.
  • by Genda ( 560240 ) <marietNO@SPAMgot.net> on Friday March 04, 2005 @05:10AM (#11842459) Journal
    I have a good friend who's an ex-spook, and a major player in the security community. She mentioned in a magazine article "It's simply amazing to watch IT Managers putting steel safes on what amounts to be Japanese paper summer houses... the front door isn't your problem..." Genda
  • by Bazman ( 4849 ) on Friday March 04, 2005 @06:05AM (#11842581) Journal
    "Hi, I'm calling from tech support, I need your fingerprint and iris scan, so could you please chop off your index finger, gouge your left eye out, and send them to me please? That's great thanks."

  • 40 years from now (Score:4, Insightful)

    by DeanFox ( 729620 ) * <spam DOT myname AT gmail DOT com> on Friday March 04, 2005 @08:52AM (#11843150)

    Whether I like the messenger or not, Mtinick is right. So long as humans are part of the security equation, we will have insecure systems. The song he's singing is true. A tune few are paying attention to. Like death, social engineering has no solution today, so it's avoided with discomfort or even ignored. Three people can keep a secret if two of them are dead. Social engineering is that last security hole still left unpatched.

    I work in IT and I can blind dial any extension, introduce myself as employee X from Corporate IT and without any pretense, obtain a user ID and password. If I am trouble shooting a user complaint and ask their user ID, their password is often offered without me even asking for it. The vast majority of viruses rely on social engineering, as do tool bars, spyware, etc. I think Mitnick is right that the problems we have today are less technical than social. Most of the security holes in Windows could exist unexploited if it were not for social engineering.

    Jack LaLane, the fitness guru, was viewed 40 years ago as a freak. It may take 40 years but once society finds a way to resolve or at least seriously takes an interest in the social engineering problems of network security, I wonder if history will label Mitnick as an early adopter or label him a "before his time" genius.
  • by helix_r ( 134185 ) on Friday March 04, 2005 @09:10AM (#11843246)

    Everytime computer security issues come up on slashdot, a torrent of geeks always chime in about how things are so bad because of "stupid" people.

    In fact, there is such a sys-admin (excuse me, I mean "architect") in my office. He loudly complains all day about how the "stupid" and "incompetent" are always making his life difficult and wasting his time.

    What I don't think he realizes is that people are afraid to approach him with questions and problems. Those that do are often quickly and rudely dismissed or put on hold for extended times.

    Here's the big problem-- if the "stupid people" in the office, you know, like scientists, professionals and others that make money for the org, dread interacting with the IT guy (I mean architect), they will go elsewhere when there are problems. If they are brushed aside when they ask about "the internet not working", they will be less likely to say anything when something _really_ goes wrong.

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...