The Battalion. (College Station, Tex.) 1893-current, January 23, 2003, Image 8

Below is the OCR text representation for this newspapers page. It is also available as plain text as well as XML.

    Scil Tech
The Battalion
Page 8 A • Thursday, Januaiy 23,20
SCI|TECH
[HE BATTAL1
our
Grass-roots trespassing
Low-tech hackers bypass security, get to the source
CHRIS JACKSON
Texas A&M is
doing everything it
can to protect its
computer network
from hackers sneak
ing in the back door.
Sophisticated firewalls
protect the network from
outside attacks, and vir
tual private networks
allow students secure
access to their information off campus and
from wireless locations on campus.
The front door to the system at A&M
and other systems, however, is being left
wide open.
On Jan. 9, 2003, malicious Saudi
Arabian hackers exploited five poor pass
words on the University phone system and
then made international collect calls at the
University’s expense.
The default passwords for at least five
voice mail accounts had not been changed.
Those default passwords were made up of
the same numbers included in the tele
phone number. Low-tech trespassers some
times exploit a few weak passwords such as
these among many strong ones to gain
access to vital information or simply for
the fun of it.
Business Week reported that an associ
ate dean at Princeton University was fired
for accessing a Yale admissions site using
student passwords that he guessed. Darielle
Insler admitted to guessing one of her
teacher’s passwords when gaining access to
her grades at the University of Delaware,
The New York Times reported. The Saudi
Arabians who hacked A&M’s phone sys
tem correctly assumed that default pass
words that included parts of the accounts’
phone numbers had not been changed.
Yet weak passwords are not always the
cause of low-tech security breaches.
Sometimes, a trespasser can gain access to
a restricted system by simply asking a user
for a password.
The industry phrase is “social engineer
ing,” and it is the technique of acquiring a
critical password or other information by
merely asking for it.
The New York Times reported that
Darielle Insler called the personnel depart
ment at the University of Delaware posing
as one of her teachers and was given the
password needed to change her grades.
She was failing math, science and English
until she asked for — and received — the
access to restricted information.
Hacker-turned-consultant Kevin
Mitnick discussed social engineering with
the San Francisco Chronicle in late
October 2002. He described how these
low-tech hackers might pose as a techni
cian trying to fix a problem.
“(Potential hackers) will call or e-mail
an unsuspecting person and tell them that
there is a problem with their network and
then try to troubleshoot that nonexistent
problem,” Mitnick said. “When the prob
lem is solved, the attacker asks, ‘While 1
have you on the phone, can I ask a favor?”’
Social engineers make it seem all right
to give out restricted information because
the engineer poses as someone who could
get that sort of information through legiti
mate channels if he wished. At first, this
approach seems simple enough to protect
against; employees and other users should
keep their information private. The skilled
social engineer, however, is able to break
through the common sense barrier to get
what he wants — whatever it may be.
Mitnick said he called a Motorola 800
number as he walked home from work one
day, and by the end of
the 20-minute walk, he
had the source code for
his Motorola cellular
phone. With that code,
he could have dismantled
his phone’s software and
found vulnerabilities to
exploit in other Motorola
phones. Mitnick did not
comment on what he did
with the knowledge, but
said, “You have to think
about how much money
and high-tech security
Motorola had used to
protect that code,” high
lighting the fact that he
had in 20 minutes what
Motorola had probably
spent millions of dollars
to protect.
The most expensive
and powerful security
available would not have
been able to protect
curity
Tips
Never sive out your password
Report suspicious requests for your
passwords
Don’t use names, places or dictionary
words as a password
Always chanse default passwords
Use numbers, uppercase and lowercase
letters
pravis swenson • THE BATTALION
Let's Co
wJm mt m HmmMmg
.. .. , ■ . ; ■ . ■: -• . '
fMgt gagf
Thursdays in The Battalion
I
1
Queso & Chips
^ONE C
8 I 5 Harvey Rd.
696-5570
1:00 p.m. - 8:00 p.m.
Monday - Friday only
Expires February 28, 2003
Offer good with purchase.
Limit one per party.
■OHIM
m M*****™^ as m&Bssm as ,
1808 Texas Ave.
College Station
and
3224 S. Texas Ave.
Bryan
We accept credit cards!
Two Can Dine for $ 5.99
2 Fish & More
or
2 Chicken & More
Pti'ISs
®B
Come and Get It!
Enjoy some Real Texas Bar-B-Q
25% OFF
I
When you present this ad. Limit 1 person.
Coupon good for up to MO. 00 . Dine In Only.
504 Harvey Road
696-7383
Valid thru May 31, 2003 • Rudy's accepts the Aggie Card
aawww Si *
_
T 1
Kyoto Sushi
College Stations Sushi Bar in Northgate
LUNCH SPECIAL
10 a.m. - 4 p.m.
1 California Roll s 2.25
2 Roll Combo *4.50
Lunch Box *7.99
: \ ^ U
Sake .
Bomb
Happy Hour
3 p.m. - 6 p.m.
Monday-Friday
Ipc. Sushi *1.25
1 California Roll
(6pc.) *2.25
I
113 College Main
In Nortngate
a* 846-5541
Thur - Fri - Sat:
till 1 a.m.
*1111
_
TO GO AVAILABLE
Thurs-Sat: 10:30am-lam
Sun-Tues: 10:30am-lOpn
farfbi
~ A 'A" llSil
Debate over Hawaiian
volcanoes continues!
0SS1
LIAONING (
lunters in China
red what may I
reirdest prehistoi
Motorola’s source code in Mitnick’s case,
because the security was not broken — it was
bypassed altogether.
The good news is that social engineering
does not need to be a problem in businesses
and organizations. The solution lies simply
in the education of users on the importance
of password security. Users should know
and understand that network administrators
and other people who actually need comput
er access codes will be able to get them
through means other than average end-users.
Large-scale computer networks have
working security measures to detect and
correct intrusions after the fact, but the bur
den of preventing these breaches falls into
the hands of the users themselves.
Yale’s associate dean was discovered in
his trespassing, Insler’s grade-changing
scheme was found out at the University of
Delaware and the Saudis’ free phone service
was promptly cut off by A&M. These uni
versities experienced problems which can
be caused by weak passwords, unwitting
divulgence of passwords, and poorly main
tained systems that employ basic or default
passwords. Without user education and co
operation, organizations will continue to
spend money barricading the back door
while intruders walk right in the front.
By B.J. Reyes
THE ASSOCIATED PRESS
Geologists say an outpour
ing of lava from the Kilauea
volcano that began last May
may have stemmed from
activity beneath neighboring
Mauna Loa, reviving a
decades-old debate about
whether the two volcanic sys
tems are connected.
“We have detected a corre
lation between these events at
a very short time scale,” sci
entists reported in the current
issue of the journal Nature.
The scientists have long
believed that Mauna Loa, the
world’s largest volcano, and
Kilauea are connected deep
beneath the Earth's surface.
But the new study suggests
there is a shallow interaction
between the magma systems
of Mauna Loa and Kilauea,
reported Peter Cervelli and
Asta Miklius of the U.S.
Geological Survey’s
Hawaiian Volcanoes
Observatory at Kilauea.
“I think it’s real,” said Paul
Segall, a geophysicist at
Stanford University. “We
know there’s ultimately a sin
gle source. This indicates that
they’re probably a little more
complicated than that and
there are interactions between
their two systems.”
Mauna Loa has erupted 33
times in the past 150 years,
most recently in Spring 1984,
when a three-week eruption
sent a 16-mile lava Bow
toward Hilo. The current Pu'u
‘O'o-Kupaianaha eruption at
Kilauea began 20 years ago
and ranks as the most volumi
nous outpouring of lava on
the volcano’s east rift zone in
the past six centuries.
Last Mother’s Day, lava
en — a four-wi
at apparently gl
tree.
The 128-mi
imal — callei
|ui, in honor of C
legist Gu Zhiwe
1/2 feet long an
if feathered wing
n its fore limbs ai
hind legs.
Exactly where
ts into the evol
|nd dinosaurs is
^searchers spec
leveloped around
s or even later
began flowing from a ne.|
vent on the west side olj
Kilauea.
At about the same timel
Mauna Loa began inflating
with the summit area risiiii|
slightly and the calderl
widening to suggest swellipj
of the magma reservoir wiy
in the volcano, researcherj
said.
“The Mother’s Day flo
was nothing spectacular o'
unusual on Kilauea. excep
that it had been preceded b;
several months of inflation.'
C ervelli said. “If it’s notcot uo ' win - birdl
cidence, this is kind of tk Archaeopteryx
first line of geophysical ev
donee that shows the twovo
canoes are communicating"
Tests, simulations ani
other monitoring determine
that the possibility of a coir,
cidence was less than one is
10, Cervelli said.
Researchers said there ait
two possible explanationsfo
the apparent connectioi
between the volcanoes.
“One way of thinkins
about it is ... Mauna L«
began to inflate and on Nfa
dieved to have I
illy flapping its u
Paleontologist
ntrigued by the d
lA a lave seen glidi
efore. but never c
rs. And they hav
our-winged dino;
‘It would be
- the weirdest c
odd of dinosau
aid Luis Chiappe
ist at the Na
/luseum of I
Zounty who did
12 squeezed its neighbc ’the dig
Scientists said
iscovered in
rovince of Liaor
f Beijing, at a
ielded several in
ens in recent ye
Kilauea. which pushed it ova
the edge and that caused tl*
Mother’s Day event,” he said
“My favorite hypothesis
that a slug of magma enteid
into Mauna Loa and actually!
as it was passing by Kilaueil e b ate between n
squeezed Kilauea and trigl ow dinosaurs
gered this failure — it spruni| v °l vet l i n t° birds
a leak, in effect, and thJ One theory he
Mother’s Day event ensued,' P these apparent
It’s hard to tell whethetf arne d to flap t
similar events have occuneei ower flight wh
before because equipmet: f rom tree
being used today — indudr theory s
continuous monitoring mi jcameei to fly 1
global positioning devices-l leir running spt
is far better than any thin; | m g s an d taking
used in the past, Cervelli saidi roun d-
I The latest find
Ion the gliding-ii
dventure
{with benefits)
Mission: Oversee an international program in one of these fields:
agriculture, business, community development, education, health,
environment or information technology.
Benefits: 24-Vacation Days a Year, Housing, Medical and Dental,
Monthly Stipend, Transportation to and from Host Country, Student I
Deferment and Graduate Degree Opportunities.
Interested? Talk to On-Campus Recruiter Dr. Nelson Jacob, ,
• In person, TAMU Career Center, 209 Koldus Bldg. /
• By phone, (979) 458-3699.
• Via e-mail, peacecorps@tamu.edu.
“It’s
fhiappe
a phene
said.
www.peacecorps.gov • 1-800-424-8580
lything that resi
e whole dinos
ctrum.”
Details of the
Thursday’s iss
Nature.
Paleontologist
e Institute c
'aleontology
aleoanthropolo]
hinese Academ
[escribed six fo
athers arranger
milar to wing fe
|rn birds.
“They are 1c
lave asymmetric
ight feathers,” /
The feathered
ar wings, Xu s
ted they could 1
1 an intermed
levelopment bei
All Ladies FREE all night!!
Guys over 21 Free until 10:00 pw
$ 1 Bar Drinks
$ 2 Premium Drinks
8-11 p.m.
$ 1 Pints f $ 2 Tap Teas
all night
Kitchen open all day, all night!!
696-5570
for details
Party Safe and Designate a Driver.
ndian sari
WASHINGTON (
lay be enough
ages in Bangladc
In a study appe
icademy of Sci
hrough nylon m<
l oncluded that tl
l illages where th
I ands of people.
I "Sari cloth is ch
I ban the nylon n
lilogy at the Ur
Iiuthor of the stu
I Colwell said r
jnost of the cho
jvater is attachec
ion commonly fc
J
C
* 10% 1
140