Data Externalization in the Eyes of a Hacker By Frogman Winn Schwartau spoke at the Def Con 6.0 conference in Las Vegas in the Summer of 1998. He also wrote the ground breaking book Information Warfare, the second edition of which was released in 1996. In his book grew the unclassified world's view of Information Warfare and the three class breakdown of types. Class 1 is personal warfare. Class 2 is corporate. Class 3 is global. In each of these is a particular phenomenon known as data externalization. What this means is that we have reached the point where accumulated knowledge exists in a larger volume outside of our collective human minds than in. The number of books, manuals, recordings and other media add up to more data than our own brains holdings. This is a very scary, albeit necessary, consequence of our current proliferation of information systems. To the enterprising hacker this provides both a distinct advantage and disadvantage. Of the advantages, we can look at quite a few. There are many public and semi-public databases available for searching through personal information. This information is not exactly sensitive, but can be used to steal an identity, aid guessing weak passwords, compromise communication patterns, and a host of other, formerly more difficult practices. These databases can be grep'd and a nice precis built. Family history, employment records, legal records and other types of data can also be found and compiled. Using this information in a Class 1 attack as a part of a larger Class 2 attack, a list of corporate employees can be built. This list can be expanded and branched to give address, background, and personality profiles. This gives rise to identity theft, social engineering, and strait hacking. The attacker can use the likely weak security held by a sub- contractor's employees to access the communication network to the larger corporation. This is essentially piggy-backing into the firewall from the identity of a trusted host. The advantages to social engineering are obvious, calling into a company, and asking questions that lead to known data, from what should be a blind start. The hacker can also use this data to bug an employee's home, and communications equipment. A cellular phone can easily have it's ESN copied, and with a scanner and filtering software, a tail can listen in on cellular conversations. A laptop with a cellular modem suffers the same attack. The tail may not be necessary, if the attacker can plant a mole or maybe a filter in the computers of the company servicing the phone. This would also break several security methods used in PCS. Hopefully those advantages to the hacker are clear as to how an unimportant Class 1 attack on an executive who works for Acme Specialty Gaskets could be a role in the attack on Boeing and their latest, greatest air superiority fighter, signaling the specter of a Class 3 attack. The disadvantages include an added ease for being tracked, the looming prospect of beefed security, and competition. In most major computing systems there are auditing systems. Records are kept and examined. The use of an unexpected auditing system can pose an extreme threat to the anonymity of a hacker. A passive sniffer, or even an inductive sniffer can be used by the hacker for a distinct advantage, but the security office can place these type of monitors on their own lines and have an invisible eye on the communications systems. The ease in which a database can be broken into will quickly spread across the underground, and thus the security level will eventually be brought into shape. These small insights are not the only prospects for a hack to employ on their quest. Those with malicious intent can easily bring into fruition an underground TRW type of service for sale to the highest bidding Info. Warrior.