Cryptography: Code Making and Code Breaking
Cryptography: Code Making and Code Breaking
HACKERS
Published in 2017 by The Rosen Publishing Group, Inc. 29 East 21st Street, New York, NY
10010
First Edition
All rights reserved. No part of this book may be reproduced in any form without permission
in writing from the publisher, except by a reviewer.
Manufactured in China
CONTENTS
INTRODUCTION
CHAPTER 1
HACKING’S EARLY DAYS
CHAPTER 2
THE SHADY SIDE OF SECURITY
CHAPTER 3
MISCHIEF AND THREATS
CHAPTER 4
ATTACK AND COUNTERATTACK
CHAPTER 5
GATHERING IN THE SHADOWS
GLOSSARY
BIBLIOGRAPHY
INDEX
INTRODUCTION
I n many ways, computers are wonderful tools. They store huge
amounts of information, control important processes, and keep
systems running smoothly. Computers can solve problems and find
solutions far faster than humans, and they can be used to help
predict outcomes of everything from global warming to baseball
games. Specialized computers control transportation systems,
computer networks, and even financial transactions.
Famed hacker Barnaby Jack once worked as a white hat hacker, testing the security of
medical devices such as insulin pumps for technical weaknesses.
Early computers required enormous amounts of space because they relied on arrays of
vacuum tubes and transistors. MIT’s hackers were always working to improve the
computers’ speed and functionality.
DEVELOPING SECURITY
Early law enforcement methods of catching hackers were usually
limited to looking at the phone records and computer logs of
suspects. Although early white hats had been present throughout the
development of ARPANET, there were few working outside of
government or university labs. That situation began changing after
the release of several malicious programs in the mid-1980s. The US
government created the US Computer Emergency Readiness Team
(US-CERT) in 1988 to track and issue warnings about security
threats such as viruses or hacking activity. US-CERT is still active.
Analysts at the National Cybersecurity and Communications Integration Center (NCCIC)
prepare for a major practice exercise. The NCCIC is one of many government agencies
dedicated to cyber security.
Early tools specifically designed to test for viruses were also being
developed. In 1989, a Purdue University student named Dan Farmer
created the Computer Oracle and Password System (COPS). COPS
was designed to test computers that used UNIX operating systems
for security flaws and was the first such security tool to become a
widely used check. COPS did several things to monitor security. It
looked for signs of intrusion and for viruses by checking for
indications that files had been modified. The program also checked
the strength of user passwords and looked for mistakes that could
make computers vulnerable.
In 1995, Farmer and another programmer named Wietse Venema
developed another set of programs called the Security Administrator
Tools for Analyzing Networks (SATAN). The SATAN program suite,
which was available for free, broke new ground by using many of the
most widespread hacker tactics to check for vulnerabilities that could
be used to gain access through networks. The programs were
controversial because some security professionals believed they
would make it easier to hack systems. Hackers sometimes used it to
test systems for vulnerabilities before trying to gain access. The US
Justice Department even investigated the software’s development
and threatened to press charges against Farmer’s employer, Silicon
Graphics.
SATAN co-developer Dan Farmer acknowledged that even though the program suite was
created to help strengthen networks, hackers and spies could also use it to probe for
weaknesses.
REIMAGINING HACKING
Hackers hired to try to break into networks provide a valuable
service by demonstrating the effectiveness of the security measures
that are already in place. They know the tricks black hat hackers use
to gain access. Their clients are often businesses that people trust
with their most personal information. Many of the biggest companies
in the United States hire white hats to test their security. Banks,
insurance companies, and health care providers are among the
businesses that hire white hat hackers to check their digital security.
Big retailers and service providers such as phone and cable
companies also sometimes hire hackers to gather information about
possible flaws in their security.
A white hat hacker performs a demonstration to show how easily a wireless network can be
penetrated by using a laptop from the back of a taxi.
White hat hackers probe networks for new or unexpected
vulnerabilities. This process is called penetration testing. Penetration
tests usually start by checking for security problems at the most
basic points of entry and then moving inward. Hackers may begin by
probing ports, testing known software defects, and examining the
patches that have been installed to fix them. They also look for weak
points within the company’s structure and phish for access to
systems. Once the white hat gains access, he or she reports back to
the organization’s information technology department so that those
professionals can fix the problems.
VEHICLE VULNERABILITIES
In 2015, white hat hackers Charlie Miller and Chris
Valasek managed to remotely access the controls of
a Jeep Cherokee. Working in tandem with a journalist
for Wired magazine, the hackers accessed the
vehicle’s controls through its computer system and
manipulated the radio, windshield wipers, and air
conditioner before disabling the Jeep. Miller and
Valasek had hacked vehicles before, but this
experiment showed they could do so from ten miles
(sixteen kilometers) away. Many functions on recently
manufactured vehicles are now automatic and
controlled by computers, and hackers could put
many lives at risk by accessing them. Vehicle
manufacturers are also quick to point out that it
would be very difficult for most people to hack into a
car’s computer.
By taking control of an automobile, white hat hackers Charlie Miller (left) and
Chris Valasek exposed just how vulnerable many everyday activities such as
driving are to hackers.
Many black hats hack for personal gain, whether they intend to
sell the information or use it themselves to commit fraud. Financial
institutions such as banks and lenders have been targeted with
attempts to steal account information. The Internal Revenue Service
(IRS) is a favorite target because of the many personal details
available on tax returns.
ONLINE HAZARDS
Individuals are increasingly becoming the victims of black hat
hackers. Not only can their personal information be stolen in hack
attacks against large targets, but hackers also attack people in a
number of ways. The World Wide Web offers multiple possible
threats from black hat hackers. Typically, individuals become hacking
victims when they are tricked into downloading malware or they visit
an unsecured website, where a malicious program downloads to
their computer.
Millions of people had their credit card information exposed after hackers broke into
networks belonging to the discount retailer Target in 2013.
HACKER TECHNIQUES
Black hat hackers look for security weak points they can use to
break into secure systems. They often use a technique called “social
engineering.” The first step might be to perform public surveillance.
The hackers gather information that might be useful. If planning to
hack a company, they might make a list of employees and then build
files on each of them, starting with an individual’s work email
address and following it through to that person’s social media profile.
They discover personal information, from the employees’ addresses
to the names of their family members.
Pop-up windows such as this one are among the various methods hackers use to load
malicious software onto the computers of unsuspecting users.
PRYING EYES
Back in the 1980s, a high-profile hack was a major news story.
Today, black hat hacking incidents have become much more
common. However, they still receive as much attention—or possibly
more, because of society’s growing reliance on computers. Several
significant data breaches have occurred in recent years, affecting the
personal information of private citizens and celebrities, as well as
bringing corporate secrets to light.
The retail chain Target was hit by hackers in a major incident that
took place in 2013. Credit and debit card information belonging to
forty million customers was stolen. The hackers accessed the
company’s system by first attacking a small air conditioning business
that worked with Target. The hackers used malware delivered via
email to steal the access information of several employees, and then
used that data to break into Target’s systems.
Christopher Chaney (center) talks to reporters in 2011. Chaney was one of the individuals
charged in connection with the iCloud hacks of 2014.
GOVERNMENT-SPONSORED HACKING
Cyber warfare refers to the use of government-paid hackers to
breach the security of computer networks in other countries to cause
damage or steal information. The United States takes the
possibilities of cyber warfare very seriously. In 2009, the US
Department of Defense created the United States Cyber Command
(USCYBERCOM) to unify the military’s cyber warfare efforts. The
command’s mission is to bring together the military’s cyberspace
resources and expand its ability to carry out and defend against
cyber attacks.
Other US agencies have conducted their own cyber warfare
efforts. The Equation Group was a network that carried out hacking
operations for the National Security Agency. These hackers
executed operations in at least forty-two countries, including Iran,
China, Russia, Brazil, Mexico, the United Kingdom, and the United
States. Possibly thousands of computers have been victimized by
the group’s malware.
Nir Gaist is an Israeli entrepreneur and cyber security expert. His company, Nyotron,
developed the groundbreaking “Paranoid” technology, putting it at the forefront of
international cyber warfare.
HACKTIVISM
Not every ideologically driven hacker works for a
government. Some of these hackers are sometimes
called “hacktivists” because they are hacking in an
attempt to bring attention to some cause or to
damage an organization that they believe causes
harm. Their activity might range from simply defacing
a website to serious data breaches or dedicated
denial-of-service attacks. Hacktivists often have good
intentions, and in some cases their hacks have
brought important issues to light. However, the fact
that they access servers and networks without
permission makes their activities illegal. In the
hacking world, they are usually seen as black hats or
gray hats. The global collective Anonymous is
possibly the best-known hacktivist group. Its
members have pursued targets ranging from the
online payment company PayPal to terrorist
organizations such as the Islamic State of Iraq and
the Levant.
Kevin Mitnick was one of the most famous early hackers. Mitnick
began hacking in 1979, when he was sixteen years old. In 1988, he
was convicted of illegally accessing the computer system of the
Digital Equipment Corporation and copying software. He was
sentenced to a year in jail and three years of court supervision.
However, he fled before the supervision period was over and
became a fugitive. Mitnick was caught with hacking equipment after
more than two years on the run and sentenced to five years in
prison. After his release, he started a computer company. On the
other side of the law, the computer security expert and physicist
Tsutomu Simomura played a key role in helping the FBI capture
Mitnick.
GATHERING HACKERS
Hackers tend to form communities, exchanging techniques and
ideas with one another through message boards. White hat and gray
hat hackers gather for annual conferences. The Black Hat Briefings
bring together hackers and representatives from companies and
government agencies to talk about security concerns. These events
started informally in 1997 but have since grown into significant
industry events. Briefings take place regularly in cities such as Las
Vegas, Nevada; Barcelona, Spain; Amsterdam, the Netherlands; and
Abu Dhabi, United Arab Emirates. Special briefings dedicated to US
government agencies take place in Washington, DC. Workshops
called Black Hat Trainings are offered by a number of security
vendors, enabling professionals to catch up with new developments
in the field and earn professional certifications.
DEF CON is another well-known meeting of hackers. DEF CON
started in Las Vegas in 1993 and has grown into one of the world’s
largest hacker gatherings. Security professionals, government
officials, journalists, law enforcement agents, and researchers attend
the annual event. Apart from lectures on security and hacking, DEF
CON includes competitions and off-beat activities, such as lock-
picking and sprawling games of Capture the Flag. Even these low-
tech activities can teach security professionals new ways of thinking
about how hackers try to get past barriers.
GLOSSARY
algorithm A step-by-step set of rules for solving a problem, especially in
mathematics or computing.
bug An error or flaw in a computer’s software or hardware that causes a
program to fail.
cyberspace The realm of computer networks where electronic
communication takes place.
encryption The act of putting data into a coded form.
espionage The act of spying.
exploit To use to one’s own advantage.
firewall The sum of security measures intended to prevent unauthorized
access to a networked computer.
hacker A person who uses personal computers to break into computer
systems.
hacktivism The act of hacking a network or site to promote a cause.
ideology The principles and beliefs that guide an individual or a group.
legitimate Allowed by the law or correct according to the law.
mainframe A large and powerful computer system, often shared by many
users.
malicious Intentionally harmful.
malware Software designed to harm or take over a computer, electronic
device, or network.
manipulate To manage or influence skillfully, especially in an unfair
manner.
network A system of interconnected computers and other devices through
which information is shared.
phishing The act of using electronic communications to trick people into
giving up personal information.
server A computer or program that supplies data or resources to other
machines on a network.
social engineering The act of tricking people into revealing information.
virus A segment of code planted illegally and designed to copy itself while
shutting down computers, networks, and servers.
worm A program planted illegally that damages files and programs on a
computer or system.
FOR MORE INFORMATION
Computer History Museum
1401 North Shoreline Boulevard
Mountain View, CA 94043
(650) 810-1010
Website: http://www.computerhistory.org
The mission of the Computer History Museum is to preserve and
present for posterity the artifacts and stories of the information
age.
Hacker Highschool
Website: http://www.hackerhighschool.org
Hacker Highschool provides online, downloadable lessons on
hacking, cyber security, and using the internet safely, written
specifically for teens.
Internet Society
1775 Wiehle Avenue, Suite 201
Reston, VA 20190-5108
(703) 439-2120
Website: http://www.internetsociety.org
This organization works to address issues relating to the internet,
including internet education, standards, and policy.
WEBSITES
Because of the changing nature of internet links, Rosen Publishing
has developed an online list of websites related to the subject of
this book. This site is updated regularly. Please use this link to
access the list:
http://www.rosenlinks.com/CCMCB/white
FOR FURTHER READING
Allen, John. Online Privacy and Hacking. San Diego, CA:
ReferencePoint Press, 2014.
Curley, Robert, ed. Architects of the Information Age (Computing and
Connecting in the 21st Century). New York, NY: Britannica
Educational Publishing, 2012.
Curley, Robert. Computing: From the Abacus to the iPad (Computing
and Connecting in the 21st Century). New York, NY: Britannica
Educational Publishing, 2012.
Espejo, Roman. Policing the Internet. Detroit, MI: Greenhaven
Press, 2012.
Haerens, Margaret. Hacking and Hackers. Detroit, MI: Greenhaven
Press, 2013.
Mara, Wil. Software Development: Science, Technology,
Engineering. New York, NY: Children’s Press, 2016.
Netzley, Patricia D. How Serious a Problem Is Computer Hacking?
(In Controversy). San Diego, CA: ReferencePoint Press, 2013.
Parks, Peggy. Cyberwarfare. San Diego, CA: ReferencePoint Press,
2012.
Smith, Jonathan. White Hat Hacking (High-Tech Jobs). New York,
NY: Cavendish Square Publishing, 2015.
Yomtov, Nelson. Internet Security: From Concept to Consumer. New
York, NY: Children’s Press, 2016.
BIBLIOGRAPHY
Boorstin, Julia. “The Sony Hack: One Year Later.” CNBC.com,
November 24, 2015. (http://www.cnbc.com/2015/11/24/the-sony-
hack-one-year-later.html).
Burningham, Grant. “How a White Hat Hacker Breaks Into a
Business.” Newsweek, March 19, 2016.
(http://www.wired.com/2015/07/hackers-remotely-kill-jeep-
highway).
Engebretson, Pat. The Basics of Hacking and Penetration Testing.
Waltham, MA: Syngress, 2011.
Goodin, Dan. “How ‘Omnipotent’ Hackers Tied to NSA Hid for 14
Years–– and Were Found at Last.” Ars Technica, February 16,
2015. (http://arstechnica.com/security/2015/02/how-omnipotent-
hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last).
Greenberg, Andy. “Hackers Remotely Kill a Jeep on the Highway––
With Me in It.” Wired, July 21, 2015.
(https://www.wired.com/2015/07/hackers-remotely-kill-jeep-
highway).
Holmes, David. “What Keeps White Hat Hackers from Turning to the
Dark Side?” Network World, February 16, 2016.
(http://www.networkworld.com/article/3035594/security/what-
keeps-white-hat-hackers-from-turning-to-the-dark-side.html).
Leyden, John. “The 30-Year-Old Prank That Became the First
Computer Virus.” The Register, December 14, 2012.
(http://www.theregister.co.uk/2012/12/14/first_virus_elk_cloner_cre
ator_interviewed).
Lu, Donna. “When Ethical Hacking Can’t Compete.” Atlantic,
December 8, 2015.
(http://www.theatlantic.com/technology/archive/2015/12/white-hat-
ethical-hacking-cybersecurity/419355).
Mello, John P., Jr. “Hot Hacker Targets in 2016: Fantasy Sports,
Professional Services.” Tech News World, December 15, 2015.
(http://www.technewsworld.com/story/82876.html).
Oriyano, Sean-Philip. CEHv8: Certified Ethical Hacker Study Guide
Version 8 Study Guide. Indianapolis, IN: Sybex, 2014.
Reuters. “2 W. Germans Get Suspended Sentences as Computer
Spies.” Los Angeles Times, February 16, 1990.
(http://articles.latimes.com/1990-02-16/news/mn-667_1_computer-
wizards).
Singer, P. W., and Allan Friedman. Cybersecurity and Cyberwar:
What Everyone Needs to Know. New York, NY: Oxford University
Press, 2014.
Vryronis, Panayotis. “Explaining Public Key Cryptography to
NonGeeks.” Medium.com, August 27, 2013.
(http://articles.latimes.com/1990-02-16/news/mn-667_1_computer-
wizards).
Yagoda, Ben. “A Short History of Hack.” New Yorker, March 6, 2014.
(http://www.newyorker.com/tech/elements/a-short-history-of-hack).
Zetter, Kim. “An Unprecedented Look at Stuxnet, the World’s First
Digital Weapon.” Wired, November 3, 2014.
(http://www.wired.com/2014/11/countdown-to-zero-day-stuxnet).
INDEX
A
Advanced Research Projects Agency Network (ARPANET), 12–13, 15, 21
antivirus programs, 40, 45
Assange, Julian, 51
B
Berners-Lee, Tim, 51
black hat hackers, 7, 8, 16, 17, 20, 24, 27, 28, 33, 36, 46, 49, 50
motives of, 29–30
targets of, 31–34
techniques of, 38–41
C
Carmille, René, 11
Central Intelligence Agency (CIA), 13
Computer Fraud and Abuse Act, 18
Computer Network Operations, 49
Computer Oracle and Password
System (COPS), 22
cyber warfare, 47–49
D
DEF CON, 54
Diffie, Whitfield, 14
E
encryption, 13, 14, 19, 42
Engressia, Joe, 15
European Organization for Nuclear Research (CERN), 51
F
Farmer, Dan, 22, 23, 24
Federal Bureau of Investigation (FBI), 18, 49, 53
firewalls, 19, 24
G
gray hat hackers, 7, 8, 33, 27, 31, 50, 53
H
hacking
and governments, 9, 11, 19, 20, 21, 27, 30, 33, 38, 47–49, 53–54
history of, 9–19
protection against, 44–46
and security, 20–28
techniques of, 38–41
hacktivism, 20–21, 50
Hellman, Martin, 14
Hess, Markus, 18
I
Internal Revenue System (IRS), 32, 44
L
Levin, Vladimir, 18
M
malware, 16, 17, 30, 36–37, 40, 41, 45, 47, 48, 49
Marconi, Guglielmo, 9, 10
Maskelyne, John Nevil, 10
Massachusetts Institute of Technology (MIT), 11, 13
Miller, Charlie, 26
Mitnick, Kevin, 53
Morris, Robert Tappan, 17
P
phishing, 25, 36, 40 phone phreaking, 15, 51
S
Security Administrator Tools for Analyzing Networks (SATAN), 23–24
Shreateh, Khalil, 33
Simomura, Tsutomu, 53
Skrenta, Rich, 16
Sony Pictures, hacking of, 42, 49
Stallman, Richard, 29
T
Target, hacking of, 41
U
US Computer Emergency Readiness Team (US-CERT), 22
US Department of Defense, 12, 13, 47, 51
V
Valasek, Chris, 26
Venema, Wietse, 23
viruses, 7, 16, 17, 18, 22, 29, 36, 44
W
white hat hackers, 7, 8, 13, 16, 20–21, 24–25, 26, 27, 29, 31, 38, 44, 46, 51,
53
World Wide Web, 8, 18, 28, 32, 36, 47, 51
worms, 16–17, 18, 42, 48
Wozniak, Steve, 51
ABOUT THE AUTHOR
Jason Porterfield is a writer and journalist living in Chicago, Illinois.
He writes about tech subjects for several publications. Some of his
technology books include Julian Assange and WikiLeaks, Tim
Berners-Lee, Careers as a Cyberterrorism Expert, and Conducting
Basic and Advanced Searches.
PHOTO CREDITS
Cover, p. 3 GlebStock/Shutterstock.com; pp. 6, 26 Bloomberg/Getty
Images; p. 10 Hulton Archive/Getty Images; pp. 12, 17, 43, 52 © AP
Images; p. 14 Gabriel Bouys/AFP/Getty Images; p. 21 Al Schaben
/Los Angeles Times/Getty Images; p. 22 Jim Watson/AFP/Getty
Images; p. 23 Richard Koci Hernandez/KRT/Newscom; p. 25 Dick
Loek/Toronto Star/Getty Images; p. 31 Emmanuel Dunand/AFP
/Getty Images; p. 32 HEPTA/SIPA/Newscom; p. 34 Chip
Somodevilla/Getty Images; p. 35 Yingling/MCT/Newscom; p. 39 ©
Samantha Craddock/Alamy Stock Photo; p. 45 © NetPhotos/Alamy
Stock Photo; p. 48 Ziv Koren/Polaris /Newscom; p. 49 Rungroj
Yongrit/EPA/Newscom; back cover and interior pages (binary
numbers pattern) © iStockphoto.com/Vjom; interior pages (numbers
and letters pattern) © iStockphoto.com/maxkabakov.