Showing posts with label Wikileaks. Show all posts
Showing posts with label Wikileaks. Show all posts

Tuesday, March 20, 2012

Wikileaks and hacking in general

December 6, 2010

I believe all humans lie and all keep secrets. When I worked as a subcontractor for the government, one of the things I could do was lie well enough to pass a lie detector test. Most of my lies were lies of omission, but some were untruths I told. All spies lie. We have to in order to survive. Alternate identities are a lie. The way we walk is a deception: I am harmless. The way we talk is often a lie: I am not who you think. When we steal the secrets of others, we lie: I have nothing that could compromise you.

I stumbled across a secret that could have gotten me into massive trouble, had I revealed it. So, I never did. Even though its value has diminished over the years, I never will. Not telling is a lie. All secrets are, in essence, lies.

Our government tells us lies every day. Some of the lies are lies of omission, but many more are lies crafted by political parties to invoke fear into voters. Power is often maintained through a fabric of lies. When our government listens to its intelligence services for information relating to enfolding world events, it often is hearing lies. I know this, because by not telling my handler what I’d found out, I was, in effect, crafting a place where a lie could sit as its substitute. And, at least one lie did find its way into the fabric of our government’s understanding of world events because of my own actions.

When Julian Assange created Wikileaks, he and his followers worked for a world where truth can be more easily available. If no government lied to the world, what would the world be like?

Computer hackers have existed almost since the day computers were invented. Before I ever worked for the government, one of my major focuses as a management consultant was computer security. I worked on several computer crimes and solved them. I was quoted in Institutional Investor and in Pension and Investment Age on computer fraud and countermeasures and wrote an article for the Journal of Cash Management. I’ve been an expert on the topic of computer hacking for decades. About fifteen years ago, someone broke inot our house and stole documents that made it possible for them to sell my wife’s and my identity. I used my skills to track the culprit and find him (3,000 miles away). I helped get him arrested. My skills are still functional.

I think most hackers are better as fictional devices than as real people. In fiction, a writer can use a hacker to do either good or bad things. In real life, most of the hacking I know about is identity theft and its relatives. Nasty stuff. But, not all is bad. The hackers who “stole” secrets from our government and used Wikileaks to post them for all to see are doing us all a service, in my humble opinion.

The truth is out there. The hackers are setting it free.

Spy Toys

Friday, February 25, 2011

Like most thriller writers, my secret weapons really are secret weapons.

When I was writing my first thriller manuscript, I had a conversation with James Rollins, who told me where he found out about liquid armor. He got it from the US Army’s website, and has used it in some of his Sigma series. I borrowed the tech toy from him.

One of my friends is a computer hacker. He’s helped me with the theme and tech content of one of my manuscripts.

I know some folks who’ve worked at D.A.R.P.A. and they spoke to me about projects they had cancelled. Great spy tech. Even for cancelled projects, I thought D.A.R.P.A. was off limits.

Lately, however, spy technology I know about and wouldn’t have ever put in a story has showed up on television. NCIS and other shows have used tech I thought was classified. Seeing on the tube what I thought was the province of a classified status has shaken my understanding of the rules.

So then, what are the rules? Should they be followed? I thought anything with a current field use should be kept secret. I thought anything that could be used as a weapon against my government should be kept out of my fiction. Was I wrong? If NCIS, NCIS LA, and a few movies recently released offer examples of the new rules, then fiction writers can write about whatever they want.

Live and learn.

Computer Fraud and Countermeasures

March 14, 2010

I just read an article in slicon.com about corporate cyberespionage (Cyber espionage: Firms fail to take threat seriously, by Shelly Portet, http://www.silicon.com/technology/security/2011/03/09/cyber-espionage-firms-fail-to-take-threat-seriously-39747112/).

Computer fraud has been responsible for a massive number of cases of identity theft over the last decade, and there is no end in sight. Both my wife and I have had our identities stolen, and sold to criminals. As a result, we needed an attorney’s help to work with the IRS, which thought we had an offshore bank account funding terrorism. Nasty.

Has this happened to you or someone you know? Do you track your credit reports to stop identity theft (after it’s occurred)?

From the article, it appears most corporations haven’t awakened to the possibility that a cybercriminal has hacked their corporate website and stolen proprietary information for resale or competitive response.

The author of the report recommends that corporate users not copy files to their own computers, since it would provide more targets for a hacker. But there’s a problem in not having multiple copies out there: A single copy on a cloud server provides less work for a hacker who desires to modify the file so it either contains viruses or, even worse, is no longer an accurate depiction of the thoughts of its creator. Without multiple copies, reconstructing the original version would be difficult or impossible. Seems to me, offsite, offline copies would be a better alternative.

I wrote an article years ago entitled “Cash Management Data Security,” for the Journal of Cash Management (under my real name: Volume 4, Number 5, page 74). I also was quoted on the subject of computer fraud corporate cybercrime in Pension & Investment Age on November 12, “Workstation Technology Dominates Conference,” 1984, page 26): “Nothing in the field of data security has really changed over the past seven years, only the prominence of the problem.”

Now, with cloud computing becoming prevalent, it appears we’re ripe for a bigger problem than ever.

What do your think? If the company you work for is prepared to defend itself against cybercriminals, I’d like to know about it. BUT, don’t leave your company’s name (in your blogspot comment). We wouldn’t want to tempt fate now, would we?