"Cybershock"

[AUG. 1, 2000]   Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists, And Weapons Of Mass Disruption." Winn Schwartau, Thunder’s Mouth Press, 2000, 470 pages.

One of the greatest technological improvements of the 1990s was the worldwide computer network known as the Internet. With the rise of this powerful tool, people of all walks of life have enjoyed an access to information that is almost unprecedented in human history. Regrettably those who want to use it for illegal activities and/or mayhem usually accompany advancements of this kind. In his new book "Cybershock," author Winn Schwartau discusses these threats and how they can affect ordinary citizens.

 

 

Just how pervasive has the Internet become in our lives? In the opening paragraph Schwartau states that this book will have no value to the reader if, for example, you have no money in any bank, don’t use credit cards, don’t use any kind of telephone or you never plan on going to the hospital. In other words, this book is for everyone.

As an example, the impact of computers on our everyday lives was made clear in 1999 during the Y2K problem known as the millennium bug. According to the author, "With the Y2K scare, millions of people have been suddenly thrust into becoming aware of their reliance upon computers for their very existence."

 

 

This statement goes to the heart of Schwartau’s objective in writing this book: "The Internet is here and trouble has started. The rules change daily. New hacks occur by the hundred or thousand every month… ‘Cybershock’ is a non-technical manual for coping with these changes."

The book is divided into seven parts. These parts address subjects such as hackers and hacking, protecting your family, law enforcement, and the future. Within each part are several chapters that take the reader through the world of computer security and the threats posed by hackers.

In part one, "The Hackers," Schwartau profiles the potential candidates for hacking and their motivations. In addition to hackers who engage in activities for criminal or terrorist purposes, there are also ethical hackers (hired to test the security of companies), phreakers (telephone abuse), warez dudez (stealing software), and hacker gangs. "Anti-Hacking Tips and Tricks" discusses computer security issues, how to catch hackers and the controversial idea of hiring a hacker to protect your computer system. Other interesting topics explore the scope and magnitude of this problem by looking at how hackers attack computers, national security concerns and vigilantism.

 

(To top of second column)

Perhaps the most important section of the book is contained in part two, "Protecting Kids, Family, and Your Privacy." Schwartau reminds parents that "hacking is more than just breaking into big military computers; it’s also about you, your kids, and friends." Especially important are the tips on preventing identity theft, the dangers of online chat rooms and online stalking, and the proliferation of spam (unwanted junk e-mail). These threats have become a national problem that Schwartau says is compounded by the fact that "in cyberspace you’re guilty until proven innocent."

He points the finger at one of the culprits for these computer security problems: the U.S. Congress. The author writes that "Congress has seen fit to do nothing to rectify the situation…it’s a creeping invasion of your and my lives that has gone on for nearly fifty years and continues to get worse every day."

 

 

"Cybershock" is an outstanding book that explains the science of computer security and the increasing threat of computer crime in terms that are understandable to the layperson. Schwartau is considered to be one of America’s leading experts on information security, computer protection and electronic privacy. His expertise is evident as he takes the reader through the vulnerabilities of computer networks and online computer systems.

To illustrate that this problem is not new to society, Schwartau has included an introductory passage from John "Cap’n Crunch" Draper. Draper was one of the original telephone hackers from the 1970s until his capture in 1972 by the FBI. Draper’s recommendation on how to deal with today’s hackers is clear: "To treat them (hackers) like criminals and put them in direct contact with criminals is certainly not the thing you want to do. Jails are the perfect venue for transferring hacking knowledge…instead of jailing hackers perhaps they should do community service by using their skills to make systems more secure."

 

 

 

"Cybershock" is one of the most important books published to date on the perils of the Internet and is highly recommended for everyone.

For more information, visit the library at 725 Pekin St. or call 217-732-8878.

   

[Richard Sumrall, Lincoln Public Library District]

 

Back to top

 


 

Top Stories | Sports Talk | Weather

A Day in the Life | Milestones | Obituaries | Diaspora

Business & Ag | Organizations & Events | Good Neighbors | Honors & Awards | Ombudsman | Law & Courts

Crosswords | Hearsay & Hairspray |

The Arts | Family Life | Spiritual Life | Health & Fitness | Teaching & Learning | Book Look | Movies & Videos

the em space | Where They Stand | How We Stack Up | By the Numbers

Letters to Editor | About LDN | Corrections | Happy Ads | Classified Ads