Dodging the flak from a hack attack

Industry is fighting fire with firewalls, reports Paul Rodgers

For the producers of Hackers, a new Hollywood film, having their Web site hacked was merely a source of free publicity. But for the Central Intelligence Agency and the US Department of Justice, attacks on their home pages were embarrassingly public breaches.

The "Department of Injustice" attack was arguably the most severe. The departmental seal was replaced with a Nazi swastika, and Adolf Hitler was pictured as the Attorney General. A close-up picture of female genitalia underscored, and undermined, the vandals' stated political motivation: opposition to censorship on the Internet.

The CIA, by contrast, got off lightly. A group calling itself "Power Through Resistance"changed the banner headline to "Welcome to the Central Stupidity Agency", made a libellous attack on an individual, and changed the links to other pages.

Unpopular government departments are not the hackers' only targets. Companies have data that can be sold to competitors, and payments systems that can be subverted to issue cheques to crooks. Some British firms, according to rumours on the Net, have already been hit, but understandably, no-one will confirm the attacks. In all, though, hackers and viruses caused an estimated $60bn of losses and damage worldwide last year.

As the Web rolls on as an advertising medium, so too does the potential damage that vandals, motivated by ideology or some perceived grievance, can wreak.

The Web site attacks illustrate not only the vulnerability of modern computer systems but the speed with which hacking is evolving. Until a year ago most security concerns were focused on hackers getting access to confidential, even top-secret data, or the infiltration of viruses that would flash unwanted messages on screens, if benign, or crash hard disks if more vicious.

While these threats have not lessened, others have been added. E-mail, new Java language programmes - which travel via the Web to computers - and even sound and video clips are vexing security chiefs. Soon encryption systems for credit card and electronic cash transactions will join the queue as potential targets.

"We have to come up with a new application almost every month," says Dr Dev Triant, chief executive of the marketing arm of Checkpoint, the world's largest computer security firm and the second largest Internet stock, after Netscape, on the New York's NASDAQ exchange.

Checkpoint, an Israeli company now worth $1bn, achieved this dominance through the design of the first "firewall" programme that did not require extra hardware to be added to a computer system. Firewalls are the programs that stop unwanted access from the Net and, with 15,000 installations, Checkpoint now has 40 per cent of a $500m world market that is tripling in size each year.

Now, like IBM or Bill Gates' Microsoft, it is setting the pace in trying to fix common standards for the industry worldwide.

Like most security companies, it is reluctant to claim invulnerability. That would be tempting fate. But its own technicians have been unable to crack its walls, even with their detailed inside knowledge.

It also survived a concerted assault by the cream of the hacker community. 60 Minutes, an American investigative journalism programme on the CBS network, invited two hackers from a known New York hang-out for computer cowboys to its studios to test the company's defences. Word spread, however, across the world within minutes.

As a result, Checkpoint's unsuspecting technicians in Tel Aviv recorded an unprecedented 30,000 attempts to break in over a 24-hour period. All failed.

It is an impressive record, but Checkpoint is the first to admit that its product range is limited. Bright sparks in the cyber world continually add useful new doorways to computer systems for video, E-mail and other data exchange, and no one company can guard them all.

Checkpoint's firewalls, for example, will stop outside users from signing on to a system without a valid password, while allowing them to see information - like Web sites - that the provider wants to make publicly available. It cannot, however, stop an E-mail message from carrying a subversive program into a system.

Like Bill Gates before, Checkpoint is releasing data on how its programs are structured so that other companies can design products that will fit like modules alongside its own firewall.

But it is far from universally accepted and it is meeting some resistance. One rival said the standard should have been agreed by all rather than dictated by the leading supplier.

There are also concerns that the release of data could actually help hackers. One London-based consultant with a major US security company also said that, while it will probably speed up the adoption of security programs, it will be mean that any weakness will become standard too. "One big difference between muggers and hackers is that the hackers have to be smart," he said. "If there's a way in, they'll eventually find it."

Dr Triant, a mathematician by training, believes the more serious threat comes not from computer cowboys sitting at home surrounded by ashtrays and Coke cans, but from disgruntled employees. "Some 90 per cent of security breaches can be traced back to employees," she said.

If an organisation's internal security over simple things such as passwords is lax, it will always be at risk from the hackers.

Start your day with The Independent, sign up for daily news emails
Arts and Entertainment
Louis Theroux: By Reason of Insanity takes him behind the bars again
tvBy Reason of Insanity, TV review
Arts and Entertainment
Cassetteboy's latest video is called Emperor's New Clothes rap
videoThe political parody genius duo strike again with new video
Seth Rollins cashes in his Money in the Bank contract to win the WWE World Heavyweight Championship
WWERollins win the WWE World Heavyweight title in one of the greatest WrestleMania's ever seen
Arts and Entertainment
tvPoldark, TV review
ebooksA special investigation by Andy McSmith
  • Get to the point
Latest stories from i100
Have you tried new the Independent Digital Edition apps?
Independent Dating

By clicking 'Search' you
are agreeing to our
Terms of Use.

iJobs Job Widget
iJobs Money & Business

Recruitment Genius: Retirement Coordinator - Financial Services

Negotiable: Recruitment Genius: To provide a prompt, friendly and efficient se...

Recruitment Genius: Annuities / Pensions Administrator

Negotiable: Recruitment Genius: You will be the first point of contact for all...

Ashdown Group: HR, Payroll & Benefits Officer - Altrincham - up to £24,000.

£18000 - £24000 per annum + benefits: Ashdown Group: HR, Payroll & Benefits Of...

Ashdown Group: Learning and Development Programme Manager

£35000 - £38000 per annum + benefits : Ashdown Group: A highly successful, int...

Day In a Page

No postcode? No vote

Floating voters

How living on a houseboat meant I didn't officially 'exist'
Louis Theroux's affable Englishman routine begins to wear thin

By Reason of Insanity

Louis Theroux's affable Englishman routine begins to wear thin
Power dressing is back – but no shoulderpads!

Power dressing is back

But banish all thoughts of Eighties shoulderpads
Spanish stone-age cave paintings 'under threat' after being re-opened to the public

Spanish stone-age cave paintings in Altamira 'under threat'

Caves were re-opened to the public
'I was the bookies’ favourite to be first to leave the Cabinet'

Vince Cable interview

'I was the bookies’ favourite to be first to leave the Cabinet'
Election 2015: How many of the Government's coalition agreement promises have been kept?

Promises, promises

But how many coalition agreement pledges have been kept?
The Gaza fisherman who built his own reef - and was shot dead there by an Israeli gunboat

The death of a Gaza fisherman

He built his own reef, and was fatally shot there by an Israeli gunboat
Saudi Arabia's airstrikes in Yemen are fuelling the Gulf's fire

Saudi airstrikes are fuelling the Gulf's fire

Arab intervention in Yemen risks entrenching Sunni-Shia divide and handing a victory to Isis, says Patrick Cockburn
Zayn Malik's departure from One Direction shows the perils of fame in the age of social media

The only direction Zayn could go

We wince at the anguish of One Direction's fans, but Malik's departure shows the perils of fame in the age of social media
Young Magician of the Year 2015: Meet the schoolgirl from Newcastle who has her heart set on being the competition's first female winner

Spells like teen spirit

A 16-year-old from Newcastle has set her heart on being the first female to win Young Magician of the Year. Jonathan Owen meets her
Jonathan Anderson: If fashion is a cycle, this young man knows just how to ride it

If fashion is a cycle, this young man knows just how to ride it

British designer Jonathan Anderson is putting his stamp on venerable house Loewe
Number plates scheme could provide a licence to offend in the land of the free

Licence to offend in the land of the free

Cash-strapped states have hit on a way of making money out of drivers that may be in collision with the First Amendment, says Rupert Cornwell
From farm to fork: Meet the Cornish fishermen, vegetable-growers and butchers causing a stir in London's top restaurants

From farm to fork in Cornwall

One man is bringing together Cornwall's most accomplished growers, fishermen and butchers with London's best chefs to put the finest, freshest produce on the plates of some of the country’s best restaurants
Robert Parker interview: The world's top wine critic on tasting 10,000 bottles a year, absurd drinking notes and New World wannabes

Robert Parker interview

The world's top wine critic on tasting 10,000 bottles a year, absurd drinking notes and New World wannabes
Don't believe the stereotype - or should you?

Don't believe the stereotype - or should you?

We exaggerate regional traits and turn them into jokes - and those on the receiving end are in on it too, says DJ Taylor