The Hacker Profiling Project 122
NewsForge writes "NewsForge is running a story about a project aiming to profile hackers like the police do with common criminals. Not based out of the U.S. per se, this project falls under the auspices of the United Nations Interregional Crime and Justice Research Institute (UNICRI). The project was co-founded by Stefania Ducci, in 2004, along with Raoul Chiesa." From the article: "NewsForge: What would the project concretely produce as final output? Stefania Ducci: The final goal is a real and complete methodology for hacker profiling, released under GNU/FDL. This means that, at the end of our research project, if a company will send us its (as detailed as possible) logs related to an intrusion, we — exactly like in the TV show C.S.I. when evidence is found on the crime scene — will be able to provide a profile of the attacker. By 'profile' we mean, for example, his technical skills, his probable geographic location, an analysis of his modus operandi, and of a lot of other, small and big, traces left on the crime scene. This will also permit us to observe and, wherever possible, preview new attack trends, show rapid and drastic behavior changes, and, finally, provide a real picture of the world of hacking and its international scene."
What have they done to our language (Score:5, Insightful)
Re:What have they done to our language (Score:4, Funny)
Re: (Score:2)
Either that or they are comparing things like Ritz, Club and Saltines.
Re: (Score:2)
But Brits might think they hired Fitz.
Re: (Score:1)
Re: (Score:1)
[/election day propaganda]
Don't like change? (Score:5, Insightful)
Re:Don't like change? (Score:4, Insightful)
Re: (Score:2)
Re: (Score:2, Funny)
I'm sorry, couldn't resist.
Re: (Score:1)
You mean Wikiality?
Re: (Score:3, Interesting)
If you're pointing at your head.... (Score:2)
Re: (Score:1)
Re: (Score:2)
Incorrect. Both deffinitions are as accurate today as they ever were since both are still part of accepted use.
I didn't say that the old-school definition of hacker was incorrect, only that 99% of the populace only knows the computer breakin definition.
There is no 'fight' here, it's just the usage functions in the English language.
Obviously you're wrong, since there's so many people upset by the computer breakin definition and actively resist it. My point is that it's useless to try to change the definitio
Re: (Score:2)
Here's a novel concept. If you need a word for a new concept, create a new one - either from historical language roots, another modern language, or completely out of your own imagination. To completely change the meaning of an already existing word is weak & simpl
Re: (Score:2)
Re: (Score:3, Informative)
Re: (Score:1)
So for instance they will look at the level of technical knowledge needed to do what was done, which could help them determine whether they're looking for a script-kiddie or a guru.
They could look at how quickly the attacker was able to locate their target, which on a reasonably sized network may tell them whether it was an inside-job, a skilled attacker, or a script-kiddie who struck it lucky.
They could look for signs of au
Re: (Score:2)
Add "who hasn't had a date in years, living in his parents basement." to that and I think we will have our profile.
Re: (Score:1)
Re: (Score:2)
The usage that takes hold in the larger world is what matters.
This is precisely why arguing that "copyright infringement is not theft" is so futile. The idea is too deeply entrenched in the language to be uprooted now.
Re: (Score:2)
I've met people who do seemingly illegal things, but use brilliant self made solutions.
Re: (Score:1)
When the tabloid press misuse the word then, OK, I'll live with it but when Newsforge misuses it, or should I say uses it with its now accepted tabloid meaning, I feel a twinge of regret for the passing of an age.
Police want a hacker, polly want a cracker (Score:2)
Language unfortunately gets screwed up and typically ends up going with the mass usage. Colour becomes color. Milliard (10^9) becomes billion...
Re: What have they done to our language (Score:1)
Re: (Score:1)
Re: (Score:2)
Semantic war (Score:2)
It's possible that changing of the meaning of the word form positive to pejorative is the sign of how society see software developers. It's similar how in modern russian old word for "Jew" become offensive word, and it's modern form also sometimes used as offence (less so after the fall of communism)
Like CSI? (Score:5, Funny)
You mean they stand around in a dark room and spout techno-BS while a computer graphically and textually points out the obvious?
Re: (Score:2, Funny)
Re: (Score:2)
Re: (Score:2)
Oh yes, you can. Here's the source code of that program's main function:
Re: (Score:1)
they mean they will take pictures of it from wierd angles and with wild lighting to make it look far more dramatic than it really is.
you will also get things blurted out like.....
"The log here has a Gentoo Fingerprint, I think we are dealing with a Computer mastermind!"
Re: (Score:2)
Funny, entertaining, I have the best appetite while watching CSI and I regularly enjoy supper watching CSI, but its not scientific. I hope m
Re: (Score:3, Informative)
Actually, that's not correct either.
The real explanation is that a car is a big wide chunk of metal and that metal provides a better path to ground than the path which happens to go through your soft fleshy tissues.
For it to be a Faraday cage, it would have to be sealed or having only small holes (with their size depending on the frequency of the
Re: (Score:2)
Also, as the anonymus coward poster described, you've just described the same underlying mechanism.
Re: (Score:2)
Suffice it to say that Wikipedia is wrong, yet again. Any decent physics class would tell you so.
Re: (Score:2)
Re: (Score:1)
If they are going to procede as CSI we are all doomed. I mean who wants to go around for the rest of their lives looking at the world through orange tinted glasses?
Although I admit that the clean, shiny luxury accommodation holding cells would be a nice upgrade on reality.
KFG
Re: (Score:3, Interesting)
OH NO (Score:1, Funny)
Mod up (Score:2, Insightful)
Re: (Score:2)
I'm sorry, but can you cite a source where such an attempt to acquire the data has been made? Or are you just betting on the general tendency of governments to try to encroach more and more upon our privacy? I ask because healthy paranoia is one thing, but I think you might be going overboard.
Re: (Score:1)
Incidentally, I'm a little ashamed to admit this, but I once picked up a book on rootkits for Windows because the
Tools are the same for everyone (Score:3, Funny)
Lemme guess (Score:4, Funny)
"Round up the usual suspects"
Re: (Score:2)
UN (Score:2, Funny)
Re: (Score:2)
At least til my bosses, bosses, [...], boss declairs war on them.
-nB
Re: (Score:1)
One question (Score:5, Funny)
Will the rankings be computerized?
Re: One question (Score:1)
what about "evidence" like... (Score:1)
-Exactly- like on C.S.I.? (Score:1)
Something interesting that might be related to it (Score:5, Interesting)
The idea was to "fingerprint" hacking attempts by measuring timing in typing on terminals. Say, a hacker would attack a system, a fingerprint would be taken (of the unknown hacker's typing habits) and then on another break-in, a new fingerprint would be taken and compared to previous ones to determine if it is a formely filed hacker.
Another possibility from that idea was to use the fingerprint also to verify the user's identity (you have to enter a password, but the server also fingerprints you and denies access if the fingerprint does not match).
Definitely one of the best expositions in the congress. Pity I cannot find any papers. I found the original presentation, in spanish though, by searching for "Remote identification of keystroke patterns" on google.
Re:Something interesting that might be related to (Score:2)
To test for a null hypothesis (Score:1)
Extending the above, it's better to use the fingerprinting as the basis of prosecuting an alleged hacker, by testing the null hypothesis, which is: a particular hacker is the
Re:Something interesting that might be related to (Score:2)
I can see their profile of me already... (Score:4, Funny)
Cm'on now, can't we even get our terminology straight? [wikipedia.org].
Re: (Score:1)
You can do comments in perl ? Tell me more.
profiling by system logs??? (Score:2)
40 year old white male
lacks typical social skills
unmarried, no girlfriend
drinks highly caffinated beverages
has a scraggly, unkempt beard
does not shower
lives in his parent's basement...(for free)
That narrows the list of a bajillion suspects down to...hmm...maybe this profiling thing doesn't work as well as it does on tv? Screw it, bring 'em all in!
Re: (Score:2)
---a much smaller number than the Geek may want to think about.
Great idea.. (Score:3, Funny)
Frankly, some of those interfaces out there in FS/OS land are at least a misdemeanor. This project is long overdue.
Comment removed (Score:5, Funny)
Re: (Score:1)
Re: (Score:1)
Re: (Score:3, Interesting)
Re: (Score:2)
T-Shirts. (Score:2)
Hacker profile??? (Score:1)
Re: (Score:2)
Goody-goody (Score:1)
Good Luck (Score:1)
A. Not respond
B. Lie
C. Use these results to their advantage
Don't worry about that intrusion on the development server - the profile suggests it was only a script-kiddie looking for mp3s
What is next? A questionnaire if the Mafia prefers 9mm or
Re: (Score:1)
Re: (Score:2)
C.S.I. Second Life (Score:1)
interesting
will it feature lots of weird camera angles, like from the floppy disks point of view?
how about from the keyboard point of view, looking straight up the nose of the hacker
Alternate uses (Score:1)
Self rating (Score:2)
Re: (Score:2)
Well someone had to post it... (Score:2, Funny)
What about this profile? (Score:2)
For logs, I suppose a teacher would have sent in a screen capture of the messenger window?
pr0filer @ Defcon 7 anyone? (Score:2)
Studies like this do more harm than good (Score:1)
On the other hand they state:
I might suggest that the
Re: (Score:1)
My guess is "Tron" and "some IT guy in the government." Maybe Tron's user.
Crack the project? (Score:1)
Duh (Score:2)
Re: (Score:2)
Re: (Score:2)
I'm criticizing both. I see your point re: first-stage methodology, but it sounds like they're handing out surveys to people who fit a preestablished profile through self-selection, which fails Psych Stat 101 as far as the validity of their results. Beyond that I cannot say, since their website is long on appeals for credib
Re: (Score:2)
Re: (Score:2)
What you say is technically true, but not necessarily economically viable. Also, I think you are assuming that these guys are doing new and unique work. They are not.
Likewise, I think it's a good idea to test all of this because yes, "Duh," people can make money hacking and it's been happening a lot more lately. How much m
The biggest flaw with this is... (Score:2)
from TFA... (Score:1)
SD: Because the purpose of this study is trying to describe objectively hackers' everyday life, providing the people that have a poor knowledge of the hacking scene and the digital underground with a clear vision, uninfluenced by mass media or personal prejudices, putting an end to all the stereotypes surrounding this world. "
BWAHAHAHAHAHAHAHAHHAHAHAHAHAHAHAHA! *wipes tears from eyes*
Finally (Score:1)
Finally GNU is used by "Teh Evil[tm]". I mean, come on, this is ridiculous.
We already have one. (Score:1)
Hackers? (Score:2)
They should be worried about people that break into computers. Such people are "wannabes", not hackers. They may have some of the skills that would be suited to becoming a hacker, but they don't have the true hacker mentality, which is about building things, not breaking them. As ESR states, "being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer."
Re: (Score:2)
There's a big difference between overcoming barriers on the one hand, and vandalism, theft and fraud on the other. The people that commit the latter are not "hackers", they are criminals, and need to be dealt with accordingly.
That the media confuses the two only demonstrates that the media is ignorant (willfully or o
How About Political Crook Profiling (Score:2)
This reminds me of somethat that I've been thinking of for a while. By tracking various publicly available information, it should be possible to profile the current politician crop as to how corrupt they really are. For example, if a politician has attended the same parties that Abramoff attended or even was even in the same cities at the same time more than probability allows, then that would count towards that politician's corruption index. Say if that politician used the same lawyers that mob connecte
sounds alot like d0xmaster (Score:2)
Re: (Score:2)
Here's the questionnaire that they refer to - http://hpp.recursiva.org/en/q1.php [recursiva.org].