Expert challenges UFO hacker’s $700k bill | 22 Sep 2009 | ComputerWeekly.com

via Expert challenges UFO hacker’s $700k bill | 22 Sep 2009 | ComputerWeekly.com.

The US inflated the $700,000 bill for damages it slapped on UFO hacker Gary McKinnon by stuffing it with costs incurred for patching the gaping holes the hacker had exposed in its computer security, according to a document filed with the Supreme Court.

The US had not taken reasonable steps to protect its security and now expects McKinnon to pick up the bill, said an expert witness statement made in McKinnon's ongoing appeal against a US extradition order.

Peter Sommer, professor of security at the London School of Economics, said damage assessments of computer security breaches should consider “whether the victims have taken reasonable steps to limit the damage”.

[…]

“Any firewall also ought to block the 'ports' [internet access points on a computer] used by Remotely Anywhere. On this basis, the costs claimed for are features that should have been there in the first place.”

Sommer, who once advised insurers underwriting the risks of computer damage, said hackers could not be held accountable for the “consequential loss” resulting from their intrusion into systems unprotected by “preventative measures for reasonably foreseeable hazards”.

“Insurers will not insure computers or computer-dependent businesses in the absence of reasonable levels of protection and means of recovery,” he said.

But security experts in the US said McKinnon should be liable for the full $700,000 of security checks performed in his wake.

Professor Eugene Spafford, founder of the Center for Education and Research in Information Assurance and Security at Indiana's Purdue University, said the victim of a cybercrime should not take the blame. If someone broke a door to rob a store, he said, it was usual to charge them the cost of the door.

Anthony Reyes, a former cybercrime detective who helped develop the US Cyber Counter Terrorism Investigations Program, said, “Just because security is weak, it doesn't give you a red flag to go into a computer system and start browsing around.”

Count me with Peter Sommer on this one; I consider Reyes’ “red flag” quote to be specious, and respect Spaf as I greatly do, walking up to a door and through it regardless of a presumed “No Entry” sign does not constitute “breaking it down”; maybe faffing with buffer overflows does but having recently had 5 doors replaced at £200 per diem I am well aware of the difference between replacing broken doors and configuring a firewall properly.

Also: firewall rules do not need to be painted or weatherproofed, and they are more easily draught-proofed – at least, if they are not being installed by the US Military.

There is a perpetual tension in security analogies between the physical and virtual worlds, and all analogies break down eventually. My distribution of Crack back in the 90s was described as “handing out guns” (example response) – yet today it’s mostly forgotten, and the software which usurped it[1] is on the verge of being forgotten, too.

Nowadays there are just far too many other ways to hack, and the security challenge today exceeds the capabilities of the security generalist; that’s probably a good thing, it guarantees us all employment – 🙂 – but it also does increase the scope for bad analogy. NMap was bad and became good, Stumblers were evil – and WarChalking was the sigil of the beast, even if I never saw any – yet now every phone has a “Wifi Scanner” application.

It’s all a matter of getting over the neophobia.


[1] cloning Crack’s dictionary generation in the process – imitation is the sincerest, Solar? 😛

Comments

6 responses to “Expert challenges UFO hacker’s $700k bill | 22 Sep 2009 | ComputerWeekly.com”

  1. bartb

    While it may be usual to be asked to pay for a door that one has broken down this seems more like being asked to pay for installing a door after having walked through a door curtain to get into the building initially…

  2. Nick Palmer

    I also am with Sommer on this, but I think he’s basically on to a loser with this argument. We know that the whole basis for calculating the “damage” that McKinnon caused was not based upon anything other than making each incident exactly meet the amount required to trigger the most serious federal charges; there is no relationship to actual damage or cost. Consequently, I think that even were Sommer’s argument to be made successfully, the US would simply substitute some other made-up “cost”.

  3. William

    Spot on Alex. I think Peter Sommer has this right. The trial we dreaded may turn out to be more interesting than we thought….

  4. Isn’t Sommer wrong here in raising what an insurer would cover? Your insurance typically won’t cover riot, but you can press or be awarded damages against a rioter. And it doesn’t matter how “safe” your house was against rioting, criminal damage is criminal damage.

    As such if there were consequential damage then he should be paying for it.

    If they had inadequate defenses he can’t reasonably be charged for them implementing what they should have had in the first place.

    Certainly $700,000 sounds excessive, but without a detailed breakdown I’m not sure I have enough information to comment further.

    1. I knew a hacker once (anyone know what happened to “Snurt?”) who was a spotty teen whose party trick was to tell Primes to drop their hard drive heads onto the platter (“park” system call) whilst the disks were still spinning/rotation; this usually caused several tens of thousands of pounds of hardware damage, back in the ’80s.

      For *that* I would be interested in compansation.

      But if someone gets into a system and creates a few extra log records – or even if they trigger logging but don’t get in – should they be gonged for theft of disk space and/or of electricity, as was tried as a prosecution also back in the 80s?

      I think not…

      It does come down to details, you’re right – but I am willing to take it on faith that any figure like the above is likely inflated by (for instance) pro-rata salaries of the people doing the investigation and cleanup, people who ought and probably *are* be on the payroll in the first place.

      I don’t believe that is someone hacks my site that somehow they are magically to blame for the salaries of my security team; lawyers with an eye on the bottom line will probably see that differently, but that is where they and I clearly diverge…

Leave a Reply

Your email address will not be published. Required fields are marked *