Arrest in Cisco Code Theft 147
Kozar_The_Malignant writes "The BBC is reporting that an arrest has been made in the case of the stolen Cisco code that was posted to the internet last May. Approximately 800 MB was posted to a Russian security website. No name has been released and details are rather thin."
I feel better (Score:3, Funny)
Just because you have no name, it doesn't automatically mean you're guilty.
Re:I feel better (Score:5, Funny)
-Phixx
It always seems... (Score:5, Interesting)
Re:It always seems... (Score:5, Funny)
God Bless the Queen Mum! (Score:4, Funny)
You wouldn't believe how old some of the world's top hackers and crackers are. For example...
The Queen Mother [66.102.9.104] didn't die.
In fact, it is little known that she was an u83r1337 h4x0r whose skills reached terrifying levels during her "lifetime". However, wary of the risk of getting caught, and not exhibiting the carelessness or egotism of youth, she decided the only way to practice these skills to their full extent was to fake her own death.
It is rumored that, post-"death", she is working as a black-hat hacker on behalf of Microsoft, and that her alias is qqqqmutha ("four 'q' mother").
The Queen Mother is 104.
Re:It always seems... (Score:1)
Re:It always seems... (Score:2, Insightful)
Perhaps there are a lot of code related crimes out there done by individuals at all ages, but the objectives are different, hence the difficulty of catching those whose main goals are not those of mischief, but of industrial espionage, who I would think will be quite more interested in covering their tracks rather than boasting about their achievements.
Combination of both + money (Score:1)
Re:It always seems... (Score:5, Funny)
Re:It always seems... (Score:5, Interesting)
The older you get the less likely you are to comit a crime. Why it is is not so clear, one theroy says it is because you have more to lose (money, freedom etc) another says you have more reason to stay out of jail (children wife/husband etc), there are other reasons why this might happen but these are the two I remeber.
Re:It always seems... (Score:3, Insightful)
And of course... (Score:2, Funny)
Re:And of course... (Score:1)
Re:It always seems... (Score:3)
-nB
Yes, actually that is the case I think (Score:2)
After a while you also tend to gain an appreciation for paying people for producing software. Granted I probably won't ever buy another copy of Office unless it's the academic version, but what the hell?
Re:It always seems... (Score:3, Interesting)
Is it because the the younger ones aren't as bright and therefor don't cover their tracks as well? Or is it because as you get older, the appeal of these kind of things drops? A combination of both? Something else? I would have to assume it's a combination of both, but I have no idea.
I doubt that it has to do with intelligence. I'm living proof you don't get any brighter as you get older. :) Why is it usually the younger ones who vandalize cars and graveyards and toilet-paper houses? I'd guess it's a c
Darwin explains it best. (Score:1)
Survival of the fittest. Those smart enough not to get caught get to grow old in peace. Those weaker, are caught before they grow old.
I have IOS 11.3 source. Where is FBI? (Score:5, Interesting)
I've got and have had IOS 11.3 source sitting here for about two years. I kept notes on the dork who gave it to me. I contacted Cisco asset recovery, whom I had worked with before, and they got me to the IP guys. I've been waiting and waiting to be interviewed and nothing happens
Re:I have IOS 11.3 source. Where is FBI? (Score:1)
Re:I have IOS 11.3 source. Where is FBI? (Score:1)
Aww Poncho! (Score:5, Interesting)
Re:Aww Poncho! (Score:1)
Contrary messages in the article (Score:5, Insightful)
From the article:
Soon after the appearance of the code Cisco confirmed that the FBI was investigating how the theft had occurred.
And...
Cisco said that it had not been stolen as a result of loopholes in its software.
So, they need the FBI to determine how the theft occurred, but they're sure it wasn't because their software has security holes?
Either you know how it happened or you don't, guys. Can't be both.
Re:Contrary messages in the article (Score:2)
You can be sure of ways it DIDN'T happen without actually knowing how it did. I may not know exactly where Cisco is keeping their current source code, but I can be reasonably sure that it's not in my pants, or on the moon.
Re:Contrary messages in the article (Score:2, Funny)
Re:Contrary messages in the article (Score:3, Insightful)
It is very possible that Cisco knows how the theft happened. But keep in mind that we haven't quite realized the futureshock predictions of corporations-as-government. As such, Cisco will not be prosecuting any associated criminal case and will have to rely on the FBI, as an agent of the federal government, to maintian their traditional role. Cisco may provide what eviden
Re:Contrary messages in the article (Score:2)
Cisco may provide what evidense they have of the intrusion. But the FBI will still be running its own investigation and ultimately coming to their own conclusions - even if they end up matching Cisco's.
Ah - I see that. Yeah, that could be the case. Good point.
But - I still think "Cisco said that it had not been stolen as a result of loopholes in its software" is probably a bogus statement. How could anyone possibly know that to be 100% true? That is, unless they have the schmuck on a videocamera s
Re:Contrary messages in the article (Score:2)
Check out one of my other posts [slashdot.org] in this thread.
Re:Contrary messages in the article (Score:3, Insightful)
lets say you own a business and one day you come in and cash is missing. There are no signs of forced entry (no broken windows no kicked in doors), the only thing disturbed is the cash drawer and the tape from the security camera is missing. You can more or less eliminate a random buglery and focus on people with a working knowledge of your operations such as employess.
It's about time... (Score:1)
Stupid rush to satire... (Score:4, Funny)
Oh my god! (Score:1, Interesting)
I was wondering where my wife has been (Score:1)
Robin Williams revenge. (Score:1)
see it gets better.
Consider: this closed source code is now *feared*.
The mortals are *uncertain*. and with a little luck
they'll have a whole boat load of *doubt*.
Zeus himself couldn't have delivered a nicer gift
to all of the OSS people. Chuckle. Understand how
much you should *doubt* those people at Cisco.
Gosh. Why would I want to put anything on my machine I can't look at the source of. Hey: Thank you for reminding me why I'd really rather prefer not havin
Torrent (Score:2)
Reuters: source code lifted from Cisco corp net? (Score:2)
"The spokesman declined to name the target of the hack, but people familiar with the investigation have said authorities suspect the man lifted the source code directly from Cisco's corporate computer network."
Helevius
Re:Reuters: source code lifted from Cisco corp net (Score:3, Informative)
Re:Reuters: source code lifted from Cisco corp net (Score:5, Interesting)
This knowledge is now 3 years out of date but I really doubt Cisco has taken major leaps to improve internal security.
"the IOS"? (Score:1)
I guess "Internet" must always be preceded by "the".
Code returned? (Score:3, Funny)
Re:Code returned? (Score:2)
journalism? (Score:1)
Too much indeed (Score:1)
Mass hysteria is their game. These "reporters" have children to feed. no one can eat "higher standards".
Did the recover the stolen code? (Score:1)
Of course, what I want to know is how much 800MB of source code weighs.
The Register's spin (Score:1)
Re:"Naked Code"? (Score:1)
Not that I've heard...
Re:"Naked Code"? (Score:5, Funny)
*pronounced 'root-er'
Fancy a scone?
Re:Not off-topic (Score:2, Funny)
Re:"Code theft"??? (Score:1)
Re:"Code theft"??? (Score:1)
The offender's possessions have been thoroughly and destructively searched. After much laborious effort the stolen code has been found, dusted off, and returned unharmed to its rightful owner.
Victory for twentieth-century law enforcement techniques!
Re:"Code theft"??? (Score:1, Interesting)
"Unauthorised taking or use of someone else's property with the intent to deprive the owner or the person with rightful possession of that property or its use."
If you accidently grab the wrong coat while leaving a party, then you did deprive someone of the item, but the intent to deprive was not there, so it is not theft/stealing.
So if you want to look at the code as an object, then its probably not theft.
HOWEVER.
This code is considered a secret. Onc
Re:"Code theft"??? (Score:1)
I had the same problem when I created this account recently. I clicked on "have your password mailed to you" [slashdot.org] and got one right away. The one that was supposed to come with the account has yet to arrive.
Re:"Code theft"??? (Score:1)
-David
Re:"Code theft"??? (Score:2)
"Come on, guys, get with the times. Cisco never was deprived of it's code, so it cannot be theft. It was copyright infingement, all right, but certainly not code theft."
I'm replying to this simply because the original is currently at -1, Troll, and thus will go unread by most.
The irony here, naturally, is that when somebody dares to use the word "theft" for other unauthorized distribution of copyrighted material -- namely films and music, of course -- Slashdotters will jump all over them like they're
Re:"Code theft"??? (Score:2)
Well, when you can understand the argument, then you can join in. When someone releases something into the public domain, then, while it is freely distributed, someone makes one unauthorized copy, that is a completely different situation. This was unreleased trade secrets. Someone targeted a device, violated laws just to ac
What you really mean is (Score:2)
What you really means is: First "you can't really steal code because you haven't deprived anyone of the use of it" post.
But I see you've already been modded Troll, which is exactly what that tired old argument ammounts to in my book.
Re:What you really mean is (Score:1)
Re:"Code theft"??? (Score:1, Insightful)
2) use it
3)....
Re:"Code theft"??? (Score:2, Insightful)
No, you're posting as AC because you're a pussy and an idiot. You proved the former by not logging in, and the latter by equating the theft of intellectual property with joyriding in a car. You will further prove this when you respond to me and say, "There's no difference, commie hippy fuckwad."
Re:"Code theft"??? (Score:2, Funny)
Note:That wasnt't really me who posted AC up there. I just couldn't resist.
Re:"Code theft"??? (Score:3, Insightful)
Especially by marketing hacks. "Repurposed"? Jesus.
Whats the difference between manslaughter and murder? Semantics.
Damn good thing you aren't a lawyer. Legally murder is the *deliberate* killing of another human being; manslaughter is the *accidental* killing of another human being. Of course, the fact that you're unable to distinguish between the two is driven home by your completely irrelevent strawman argument.
Yes, theft does not mean someone was deprived of som
Re:"Code theft"??? (Score:2)
You do realize that -- and here's a wiki article [wikipedia.org] to back it up -- 2nd-degree murder is roughly synonymous with voluntary manslaughter and 3rd-degree murder is roughly synonymous with involuntary manslaughter
Re:"Code theft"??? (Score:2, Insightful)
Perhaps if you fucking put it forward better then you might just get a better fucking response.
Only a fucking antisocial troll would ruin a fucking valid and possibly well-fucking-reasoned statement with such a fucking derisive insertion of profanity and fucking insult.
Have a fucking nice fucking day.
Re:"Code theft"??? (Score:2)
Re: (Score:2)
Re:"Code theft"??? (Score:2)
Re:"Code theft"??? (Score:2)
depending on where you live, the difference can be several years or even difference between if you fry or not. that's a bit more than just semantics.
they're legal terms - YOU DON'T REUSE THEM.
"Twoccing" (Score:5, Interesting)
"For instance, if you had a summer home and left a car there so that you could just fly in and go with it, and some fuck wad took it over the winter and then put it back -- ensuring that nothing was damaged, the engine was serviced and the oil was changed and had someone on the inside so that if you were anywhere near a thousand mile fucking radius, they could put it back as good as new (or better) -- would this be theft?"
Well, in the UK at least it wouldn't be theft.
In your scenario, the car is kept as good as new and no criminal damage has ocurred, so the only offence comitted is that of Taking Without Consent (T.W/O.C in Police shorthand, hence the term "Twoccing").
This offense was dreamed up at the back end of the last century, when joyriding became immensely popular with the chavs [chavscum.co.uk] and pikies [webster-dictionary.org] that infest the housing projects of this green and pleasant land.
Since the car was invariably abandoned after the fun was over, the prosecutor could not show that there was an intent to permanently deprive the owner of his property, hence , no theft ocurred.
The Twoc law was introduced so that the fun-loving and excitable rascals who joyride could be charged with a more serious crime than merely busting a car door lock.
T&M.
Re:"Twoccing" (Score:2)
-molo
Re:"Twocking" (Score:2)
Note the subject line: It seems that the accepted spelling uses "ck", rather than double "c". I'd only heard the term verbally before I started rooting around.
Regarding sentencing: It's complicated by the fact that taking without consent is a young person's crime, so the format of the trial and the outcome are heavily dependent on the age of those convicted.
As best I can make out, simple taking without consent carries a six month maximum, while aggravated taking without consent (in which injury, endang
Theft =! borrowing (Score:2)
In the case of the car, the value of the car has been reduced due to the additional miles, and wear and tear has reduced its lifespan.. the original *copy* has been effected..
In the case of the copied code, *nothing* was done to the original copy, no wear and tear, no reduction of value or lifespan, due to its use.... Nothing.
It may be a copyright crime ( which should be a civil case, making copyright violations crimina
Re:"Code theft"??? (Score:3, Informative)
Yes indeed, it is. And unauthorized distribution of copyrighted materials is ... Follow this closely, now, it's tricky ... unauthorized distribution of copyrighted materials. It's not theft at all. That's why there's a different law, with a different name.
Whats the difference between taking something that isn't yours and taking something that isn't yours.
The difference is that when it's theft, what the owner had is somehow diminished. When it's unauthorized distribution of copyrig
Re:"Code theft"??? (Score:1)
No, the difference is intent .
Bad analogy (Score:2)
If I take your car, drive it around, and return it, you've still been deprived of your car for a period of time. In fact, your never get the same car you had back, since now I've added milage, etc.
However, if I were to copy your CD, you were never deprived of your material (unless I took it aw
Copyright infringement and theft (Score:2)
Common English, yes. You're talking about a legal term.
Whats the difference between manslaughter and murder? Semantics.
If you ever hit someone with your car, I'll bet you hope that your lawyer doesn't feel the same way.
For instance, if you had a summer home and left a car there so that you could just fly in and go with it, and some fuck wad took it over the winter and then put it back -- ensuring that nothing was damaged, the engine was serviced and the oil was change
Re:The post-arrest-press-release interview (Score:3, Insightful)
Thanks!
Re:The post-arrest-press-release interview (Score:1)
It wasn't incredibly funny, but it had a good point. Really... they already have a court date set for the guy and they haven't even formally charged him or gotten his name? That's very, very hard to believe. Even if he's guilty, this is a very fishy way to go about bringing him to court.
Re:Open Source (Score:5, Informative)
It might interest you to know that cisco is one of the top contributers (of both hardware, and money) to the Open Source Development Labs [slashdot.org].
Also even if cisco did release the code for its routers, it's architecture is so specialized that you need quite expensive machinery to even get it compiled, so it wouldn't enjoy the massive development base that linux has.
Re:Open Source (Score:3, Insightful)
This only applies to actual packet forwarding. Other interesting IOS parts are routing protocol implementations (particularly EIGRP, but another industry-strength BGP implementation won't hurt, either), scalable tunneling support (in particular mass-termination of PPP and L2TP links),
Re:Open Source (Score:2)
The IOS is not compiled on some fancy machine, it is compiled on FreeBSD servers using plain ol gcc w/ cross compiler functions (Correct me if I am wrong, but a few of my buddies are Cisco employees, and that's the proces they told me.) They don't build an ubber router and retrofit it w
Re:Open Source (Score:2)
Re:Open Source (Score:3, Informative)
Re:napalm smells like victory (Score:4, Informative)
Re:napalm smells like victory (Score:2)
"About 800 megabytes of Cisco's the Internetwork Operating System was posted on a Russian security website in May this year."
Threats to American security from British individuals aren't nearly as risky as threats from Russians. Posting the code on their website violated the Cisco copyright, which protects a lot of assets of that American company. And that kind of crime is very common in Russia, along with a host of other criminal enterprises that damage the American economy. That Russian legal and crim
Re:of course... (Score:1)