"Cybershock"
[AUG. 1, 2000]
“Cybershock:
Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists,
And Weapons Of Mass Disruption." Winn Schwartau, Thunder’s
Mouth Press, 2000, 470 pages. |
One
of the greatest technological improvements of the 1990s was the
worldwide computer network known as the Internet. With the rise of
this powerful tool, people of all walks of life have enjoyed an
access to information that is almost unprecedented in human
history. Regrettably those who want to use it for illegal
activities and/or mayhem usually accompany advancements of this
kind. In his new book "Cybershock," author Winn
Schwartau discusses these threats and how they can affect ordinary
citizens.
Just
how pervasive has the Internet become in our lives? In the opening
paragraph Schwartau states that this book will have no value to
the reader if, for example, you have no money in any bank, don’t
use credit cards, don’t use any kind of telephone or you never
plan on going to the hospital. In other words, this book is for
everyone.
As
an example, the impact of computers on our everyday lives was made
clear in 1999 during the Y2K problem known as the millennium bug.
According to the author, "With the Y2K scare, millions of
people have been suddenly thrust into becoming aware of their
reliance upon computers for their very existence."
This
statement goes to the heart of Schwartau’s objective in writing
this book: "The Internet is here and trouble has started. The
rules change daily. New hacks occur by the hundred or thousand
every month… ‘Cybershock’ is a non-technical manual for
coping with these changes."
The
book is divided into seven parts. These parts address subjects
such as hackers and hacking, protecting your family, law
enforcement, and the future. Within each part are several chapters
that take the reader through the world of computer security and
the threats posed by hackers.
In
part one, "The Hackers," Schwartau profiles the
potential candidates for hacking and their motivations. In
addition to hackers who engage in activities for criminal or
terrorist purposes, there are also ethical hackers (hired to test
the security of companies), phreakers (telephone abuse), warez
dudez (stealing software), and hacker gangs. "Anti-Hacking
Tips and Tricks" discusses computer security issues, how to
catch hackers and the controversial idea of hiring a hacker to
protect your computer system. Other interesting topics explore the
scope and magnitude of this problem by looking at how hackers
attack computers, national security concerns and vigilantism.
(To
top of second column)
|
Perhaps
the most important section of the book is contained in part two,
"Protecting Kids, Family, and Your Privacy." Schwartau
reminds parents that "hacking is more than just breaking into
big military computers; it’s also about you, your kids, and
friends." Especially important are the tips on preventing
identity theft, the dangers of online chat rooms and online
stalking, and the proliferation of spam (unwanted junk e-mail).
These threats have become a national problem that Schwartau says is
compounded by the fact that "in cyberspace you’re guilty
until proven innocent."
He
points the finger at one of the culprits for these computer security
problems: the U.S. Congress. The author writes that "Congress
has seen fit to do nothing to rectify the situation…it’s a
creeping invasion of your and my lives that has gone on for nearly
fifty years and continues to get worse every day."
"Cybershock"
is an outstanding book that explains the science of computer
security and the increasing threat of computer crime in terms that
are understandable to the layperson. Schwartau is considered to be
one of America’s leading experts on information security, computer
protection and electronic privacy. His expertise is evident as he
takes the reader through the vulnerabilities of computer networks
and online computer systems.
To
illustrate that this problem is not new to society, Schwartau has
included an introductory passage from John "Cap’n
Crunch" Draper. Draper was one of the original telephone
hackers from the 1970s until his capture in 1972 by the FBI. Draper’s
recommendation on how to deal with today’s hackers is clear:
"To treat them (hackers) like criminals and put them in direct
contact with criminals is certainly not the thing you want to do.
Jails are the perfect venue for transferring hacking knowledge…instead
of jailing hackers perhaps they should do community service by using
their skills to make systems more secure."
"Cybershock"
is one of the most important books published to date on the perils
of the Internet and is highly recommended for everyone.
For
more information, visit the library at 725 Pekin St. or call
217-732-8878.
[Richard Sumrall, Lincoln Public Library
District]
|