Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Censorship Security Software Your Rights Online

Analysis Of Symantec's Stance On Censorship 273

robochan writes "According to this report in the Sydney Morning Herald, Chief Operating Officer of Symantec, John Schwarz, was quoted as 'calling for laws to make it a criminal offense to share information and tools online which could be used by malicious hackers and virus writers.' This article takes a look at the negative affects and also a couple of recent examples of "censorship legislation" backed by the COO of Symantec, and what little effect it has had on criminals, while having a substantial affect on responsible citizens."
This discussion has been archived. No new comments can be posted.

Analysis Of Symantec's Stance On Censorship

Comments Filter:
  • But maybe it's time to rethink this portion of Speech.

    Speech is not 100% protected. There are types of speech which have been declared illegal: obscenity, fighting words, etc. Perhaps it is time to take the fight to virus writers.
    • Isn't it more like this:

      You can say whatever you want, but what happens afterwards is another thing.
      • by Frymaster ( 171343 ) on Monday September 22, 2003 @02:01AM (#7022572) Homepage Journal
        no, it's more like this:

        the article states that they want to criminalize "shar[ing] information and tools online which could be used by malicious hackers and virus writers".

        tools that could help virus writers? like, what? c++? visual basic? or, more realistically, nessus?

        this is like that crime in britain: "going equipped to commit arson". ie, having a lighter in yr pocket. it's all about selective enforcement. ie, the law is interpreted by the police officer.

        now, extrapolate this situation to something like, say, computing - something that joe average judge-or-cop knows virtually nothing about.

        am i the only person who can see this being a bad bad thing?

        • by TiggsPanther ( 611974 ) <tiggs.m-void@co@uk> on Monday September 22, 2003 @03:09AM (#7022775) Journal
          tools that could help virus writers? like, what? c++? visual basic? or, more realistically, nessus?

          Or, to take it to an extreme, Notepad/vi/emacs.

          After all, the most basic tool required for writing a virus (or any piece of code) is your bog-standard Text Editor.
          • Don't forget punch card readers for all the old-school people around here!
          • by bigpat ( 158134 ) on Monday September 22, 2003 @10:03AM (#7024730)
            tools that could help virus writers? like, what? c++? visual basic? or, more realistically, nessus?

            Or, to take it to an extreme, Notepad/vi/emacs.


            No, take it to the logical ironic extreme, Norton AntiVirus 2004 is the best way to QA your virus to make sure it will get by anti-virus software. So, really we need to make sure that virus writers don't get access to such a powerful debugging tools. We obviously need to ban anti-virus software in in order to stop viruses from being written.

            Sometimes the simple solutions are the most effective.

        • by 0x0d0a ( 568518 ) on Monday September 22, 2003 @04:58AM (#7022994) Journal
          tools that could help virus writers? like, what? c++? visual basic? or, more realistically, nessus?

          Pretty much what I thought. There isn't a lot that you can really ban that would stop a virus writer without negatively affecting regular ol' developers, much less people who work in the security field.

          Frankly, I find all this silly. Most people that are handing around information on how to produce viruses will also hand around copyrighted software as well. That's illegal, but it really doesn't seem to stop them.

          The right solution is to harden hosts against viruses and worms. Outlook is a huge vector, because it has traditionally made embedding active content and executing attachments very easy. Outlook should go away. The macro system in Word is inappropriate for a format frequently used for general document distribution. Permissions should be tightened up -- there's a reason the UNIX world doesn't run into viruses.
        • by ATMAvatar ( 648864 ) on Monday September 22, 2003 @10:02AM (#7024722) Journal
          tools that could help virus writers? like, what? c++? visual basic? or, more realistically, nessus?

          Outlook Express
    • by sweetooth ( 21075 ) * on Monday September 22, 2003 @01:55AM (#7022547) Homepage
      The tools and processes of discovering and disclosing exploits shouldn't be illegal. The use of them should, and is. Why should we add regulation on top of that to prevent this type of "speech?" You should be punished for doing something wrong, not for creating something that someone else might use with ill intent?
    • by Temsi ( 452609 ) on Monday September 22, 2003 @05:02AM (#7023008) Journal
      That's absolutely incorrect.

      Freedom of speech is absolute. No exceptions.

      Obscenity is not illegal, but you can be held accountable for any harm it may cause others (including mental anguish). The FCC has obscenity guidelines for the public airwaves that TV and Radio stations must follow. The on-air personalities can say whatever they want, and their words are not illegal. The FCC can however mandate that the corporations using the public airwaves do not broadcast obscenities, and that they either bleep them or silence them, at the risk of being fined (stipulations of using the public airwaves for free).

      Fighting words are not illegal either, but you could get in trouble if you incite violence, which IS illegal.

      Yelling "FIRE!" in a crowded theatre is actually not illegal either, but you will most definitely get in trouble for endangering the public if you do it.

      There is a distinction here you have to make.
      Words by themselves are not and cannot be illegal, nor can the usage of those words be deemed illegal. The first amendment garantees that.
      The results of what happens because you spoke your words of choice, however, CAN be held against you.
      If you say in a public place "I wish he were dead" (about anyone) you have the right to do so.
      However, if you were to say "Go kill this guy", and someone who heard you went out and did just that because of what you said, then you would absolutely be held accountable for saying it.

      Anything you say is legal, regardless of content.
      The consequences of what you say is another matter entirely.

      Fighting virus writers by banning the words they write is absurd and stupid. It is a slippery slope we do not want to enter. It sets a dangerous precedent that can and will be abused. If you ban one use of language, it's very easy to ban another. Next we'll be banning negative movie reviews because they can hurt the movie's business and thus must be banned. Or perhaps we'll start calling people traitors if they criticize the President. Oh, wait, Ann Coulter already is doing that. But of course she has the right to say that too...
      • Freedom of speech is absolute. No exceptions.

        Nope. Freedom of EXPRESSION is. Freedom of speech is far from absolute, and you listed many examples why.

        Subtle difference, but there are many things that you can face charges for saying. Libel, Slander, the list goes on and on. But no one can arrest you for expressing an opinion.
  • by Leffe ( 686621 ) on Monday September 22, 2003 @01:49AM (#7022519)
    GCC [gcc.gnu.org] has been made illegal.
  • by BorgDrone ( 64343 ) on Monday September 22, 2003 @01:49AM (#7022522) Homepage
    information and tools online which could be used by malicious hackers and virus writers
    So that would include:
    • Compilers
    • API documentation
    • Text editors (can be used to write VBScript virii)
    • Microsoft Office (macro virii)
    Sounds like a really well thought out idea.
    • Well, as formulated it would also ban Windows, computers in general, coffee, oxygen...
  • A clarification (Score:5, Informative)

    by Chairboy ( 88841 ) on Monday September 22, 2003 @01:50AM (#7022527) Homepage
    An important clarification from an article on this subject a few days ago:

    http://www.smh.com.au/articles/2003/09/12/106326 85 53158.html

    Asked whether Schwarz would like to clarify whether he had really meant that full disclosure should be legislated against, Symantec's Asia-Pacific public relations group manager Lindy Yarnold did not directly deal with the query but said: "Symantec fully supports information sharing on threats and vulnerabilities and believes it is an important tool for consumers and IT professionals to gain a measure of early warning of potential attacks."
  • motive (Score:5, Insightful)

    by benna ( 614220 ) * <mimenarrator@g m a i l .com> on Monday September 22, 2003 @01:51AM (#7022528) Journal
    I don't even understand why he would want this. Its in his companies interest to have worms and viruses going aroudn because if there weren't any, nobody would need antivirus software.
    • Re:motive (Score:5, Insightful)

      by richie2000 ( 159732 ) <rickard.olsson@gmail.com> on Monday September 22, 2003 @01:57AM (#7022553) Homepage Journal
      Its in his companies interest to have worms and viruses going aroudn

      Yes, but he doesn't want people to be able to clean them up themselves. Hence, he wants to limit the free dissemination of information to all, knowing full well that the black hats does not rely on official security bulletins to plot their next move.

    • Obvious (Score:5, Insightful)

      by oGMo ( 379 ) on Monday September 22, 2003 @01:59AM (#7022563)

      Well, there will always be virus authors, it's like banning weapons: you're only taking away from those who get things through legitimate means.

      Think what this would ban: bug tracking and security lists, compilers, assemblers, debuggers, hex editors, etc. These are how viruses get written.

      However, if the public doesn't have access to any of this (particularly security tracking lists), then antivirus companies become the one and only legal source for fixes. Presto, huge demand created, which means more legislated profit.

      There's your paranoia for the evening.

      • Re:Obvious (Score:3, Insightful)

        by muffen ( 321442 )
        Well, there will always be virus authors, it's like banning weapons: you're only taking away from those who get things through legitimate means.

        Not true at all. In Europe, I don't think that most people, criminals or not, can get hold of weapons easily. There are better things to compare it to than banning weapons!

        Think what this would ban: bug tracking and security lists, compilers, assemblers, debuggers, hex editors, etc. These are how viruses get written.

        Apart from the first two, NO!
        He didn't
    • Re:motive (Score:5, Interesting)

      by Grishnakh ( 216268 ) on Monday September 22, 2003 @02:24AM (#7022642)
      As others have noted, what Symantec really wants is to prevent people from cleaning up the worms and viruses without paying Symantec a fee.

      But if the number of viruses and worms goes down, I'm sure Symantec would be happy to write a few more to keep their profits up.
    • Re:motive (Score:3, Insightful)

      by FCKGW ( 664530 )
      Black hats are going to share info, legal or not, so viruses and worms will still spread regardless of whatever gets passed into law. It will only stop white hats from sharing info, <conspiracy theory> so the only source to get rid of an infection or get a patch or workaround is Symantec. </conspiracy theory>
  • by sssmashy ( 612587 ) on Monday September 22, 2003 @01:52AM (#7022532)

    In conclusion, whether or not Symantec's COO is just smokin' crack or understands what is at risk, any attempt to censor these critical security tools, including exploit code, from the Internet will result in a constitutional travesty followed by a significant market downturn, a degraded security community, and the commercialization of vulnerabilities where the market is driven by the criminals we are trying to "stop".

    • by sssmashy ( 612587 ) on Monday September 22, 2003 @01:58AM (#7022557)

      Just wanted to say that this is the longest run-on sentence I've ever read that includes the words "smokin' crack".

      • If, as stated in your previous post that obviously didn't quite contain all the information you wanted to include in it, the quote you used was the longest ever run-on sentence that included 'smokin crack', I believe you are in for a pleasant surprise, not unlike the surprise you receive the very first time you are smokin crack, except for the fact that you do not own a time machine, and could not have foreseen this monstrosity.
      • It's not a run-on sentence. It's gramatically correct, though it is quite long. Take a look at Webster's Run-on Reference [commnet.edu].
    • I've got $10 that says the phrase "smoking crack" becomes the root of the Next Overused Slashdot Phrase. Anybody want to take me up on this? Anybody?
  • by SnappingTurtle ( 688331 ) on Monday September 22, 2003 @01:52AM (#7022534) Homepage
    After all, I assume every virus writer tests his/her virus by running it through anti-virus software. If we would just get rid of that virus-helping software, we'd be safer from viruses.

    Those damn virus-helpers over at Symantec, I hope the law skins them alive.

  • Symantec? (Score:4, Insightful)

    by yanestra ( 526590 ) on Monday September 22, 2003 @01:55AM (#7022545) Journal
    I guesss they Symantec people themselves expect not to be subject of their new law?
    • If the security profesionals I've encountered are any indication, then Symantec is probably full of ex-millitary, FBI, and CIA people. I'm sure there are nice people who choose to work for those agencies - I never meet them, I meet the power tripping assholes who think Ashcroft is soft. Such people have a mindset in which no one but professionals having access to security information is an excellent thing, free speech be damned.

      So of course the law would not apply to them, they're the good guys.

  • by Barbarian ( 9467 ) on Monday September 22, 2003 @01:56AM (#7022548)
    If people can't discuss bugs and security problems online, the only places it will be done is privately, i.e. in Symantec's and NAI's labs... this is one way to kill your competition--get the government to outlaw it.
  • Burglary Tools (Score:5, Interesting)

    by EmpNorton ( 124581 ) on Monday September 22, 2003 @01:58AM (#7022556) Homepage
    I believe it is illegal in most states to be in possession of 'burglary tools' such as slim-jims, lock picks, and the like unless you are licensed in some way to own them (mechanic, lock smith, etc...).

    When (if ever) do 'hacking tools' fall under this category? Obviously any tool can be used with ill-intent, but are there specific pieces of software that could be classified as such?
    • Re:Burglary Tools (Score:3, Interesting)

      by kfg ( 145172 )
      I know of a man who was convicted of possesion of a burglery tool because he was carrying . . . a screw driver.

      Just an ordinary screw driver. Not modified in any way.

      The really funny part is that was actually part of what he stole, and as he left the house to boot.

      Was not the legitimate owner than also guilty of possession on a burglery tool? He even kept it in a toolbox on his back porch where burglers could get ahold of it ( as evidenced by the fact that one did).

      "Ok, now to see if the server is respo
    • Re:Burglary Tools (Score:5, Insightful)

      by MoralHazard ( 447833 ) on Monday September 22, 2003 @02:26AM (#7022644)
      Not quite. First of all, this varies depending on jurisdiction--in some places, owning/possessing/carrying lock-opening tools is problematic (not illegal outright, though), and in other places it's perfectly acceptable.

      In the places where it is trouble to carry lockpicks et al., you can't get busted for possession or ownership of the devices in the same way that you can get busted for possessing, say, pot or cocaine. Instead, the possession of those kinds of tools, WITHOUT a reasonable excuse, is considered prima facie evidence of an intent to commit wrongdoing. So if a cop catches you with lockpicks in one of these states, he can bust you for conspiring to commit a burgalary.

      But remember, prima facie evidence only means anything in the absence of a countervailing explanation. If you're a locksmith on the way to a house call, you're obviously not planning to commit a crime, and so the cop can't assume that you have intent. Well, he could, but a good lawyer could get the whole beef thrown out in pretrial.

      More to the point--I think this comparison fails because information and tools relating to virus/worm manufacture are even more "dual-use" than lockpicks. Lockpicks are for opening locks--the only question is whether you have permission to be opening those locks. Tools and information that could POTENTIALLY be used to code malware would include every CS textbook, compiler, and PC ever made. And my lecture notes from Data Structures in Java (which are already pretty criminal on the basis of the handwriting).

      Even exploit code has a legit purpose. Am I going to take offline/patch every sshd in my organization because of a crappy rumor that there's a remote DOS overflow? Hells, no! I ain't gonna patch shit until somebody shows up with an actual, working exploit--you have to manage these risks based on the liklihood that a threat exists (potential threates get patched tomorrow morning, actual exploits get patched tonight) and the amount of shit required to fix it (will this break remote access to all my servers? Do I have the manpower to test and deploy the patch right now, when I'm still fucking around with Windows RPC stuff?).
      • "Even exploit code has a legit purpose. Am I going to take offline/patch every sshd in my organization because of a crappy rumor that there's a remote DOS overflow? Hells, no! "

        Mind if I ask where you're working, name/address or ip will suffice. TY.
      • Re:Burglary Tools (Score:3, Interesting)

        by little1973 ( 467075 )
        In the places where it is trouble to carry lockpicks et al., you can't get busted for possession or ownership of the devices in the same way that you can get busted for possessing, say, pot or cocaine. Instead, the possession of those kinds of tools, WITHOUT a reasonable excuse, is considered prima facie evidence of an intent to commit wrongdoing. So if a cop catches you with lockpicks in one of these states, he can bust you for conspiring to commit a burgalary.

        It's kinda like Thought Police, isn't it? To
    • Not quite. (Score:5, Insightful)

      by rjh ( 40933 ) <rjh@sixdemonbag.org> on Monday September 22, 2003 @02:51AM (#7022716)
      It's not illegal to be in possession of burglary tools. If that was the case, you'd be breaking the law just by keeping a crowbar in the trunk of your car.

      It's illegal to be in possession of burglary tools while committing a burglary, under the theory that bringing burglary tools to a burglary shows that you approached the burglary with premeditation and planning. Premeditated, thought-out-in-advance crimes are almost always punished more severely than "amateur night" or heat-of-the-moment crimes.

      E.g.., if I use a rock to break a car window, reach inside and pull out the stereo... maybe I'm a career criminal, or maybe I'm just someone who made a really stupid choice.

      But if I've picked the lock on the door with a SlimJim, brought open specialized tools to crack the dash and remove the radio in 15 seconds flat, then it's a pretty good bet I've done this crime before and I'll continue to do it in the future--both of which make me a more serious criminal in the eyes of the law.
    • Slim Jims? (Score:3, Funny)

      by toupsie ( 88295 )
      My corner convenience store has buckets of Slim Jims! Now I have to get a license to eat one? Also, how do I burglar with one?
  • Slippery Slope (Score:5, Insightful)

    by shirai ( 42309 ) on Monday September 22, 2003 @01:59AM (#7022560) Homepage
    I think this is the slippery slope defined. Even if it were a good idea to keep these tools away from easy access (I won't reiterate the many arguments why it isn't), it is extremely difficult to know exactly where the line from "general purpose networking tool" to "hacking tool" is drawn.

    Considering that virtually any tool can be used to hack, when does something get legislated as illegal? Somebody uses a web browser to hack. Is the web browser now an illegal hacking tool?

    Okay, maybe that was too easy. But a packet sniffer?

    I think one could easily make an argument that that is a hacking tool. Ultimately, the legal definitions may center around "public perception" as often seems to be the case in technical legalities instead of technical accuracy. This is, unfortunately, because the general public typically doesn't understand technically how things work. Notice most bad press is based around technologies that the average guy doesn't understand.

    We're treading on dangerous grounds Symantec...

    Slippery Slope...
    • Re:Slippery Slope (Score:5, Insightful)

      by Hatta ( 162192 ) on Monday September 22, 2003 @02:49AM (#7022710) Journal
      That government which governs best, governs least.
    • Re:Slippery Slope (Score:2, Interesting)

      by entartete ( 659190 )
      I remember some PHB type at a university i worked at had this list of 'hacking tools' that he had gotten from some 'security expert' that we were supposed to be on the watch for if we saw any of the students using these dangerous and evil things. These tools included things like text editors and resource fork editors for macintosh and such. I thought at first that it was some prank played upon the the PHB but whoever gave the this list to them was apparently completely serious about it.it was funny and scar
  • Why does it seem that every single proposed or actual law targeted at "cybercrime" puts absurd limitations on legitimate research while having absolutely no effect on the criminals?
    • Because most of the people pushing for legal changes to reduce "cybercrime" have little or no interest in actually reducing cybercrime. They have their own aims, and fear of cybercrime makes a nice vehicle to put their own issues through.
  • Whee. (Score:4, Insightful)

    by Aldric ( 642394 ) on Monday September 22, 2003 @02:01AM (#7022575)
    They've just outlawed a large chunk of programming knowledge. Well, non-US programmers now have a lot less competition! ;)
  • by Anonymous Coward on Monday September 22, 2003 @02:01AM (#7022576)
    If you stick to shrinkwrapped software, and DON'T run ANY other form of executable, then you DON'T need anti-virus software.

    So what is this "Norton AntiVirus" for? To help people who download cracked software keep their computers healthy? Sounds like a shady product to me.
    • If you stick to shrinkwrapped software, and DON'T run ANY other form of executable, then you DON'T need anti-virus software.

      You sir, are wrong. There is a product on the market that comes shrink wrapped, and is by far one of the worst viruses ever made. They seem to have a legitimate business operation, but innocent users fall victim to their faulty coding every single day.

      More information is available here. [microsoft.com]

  • "make it a criminal offense to share information and tools online which could be used by malicious hackers and virus writers."

    On the positive side, couldn't this also be applied to Windows, IE, and Outlook? Ignoring the buffer overflows (which all software has) these programs have been developing, promoting, and expanding the viral capabilities since at least 1998.

    After all, there's more documentable evidence of Microsoft staunchly keeping an "open" envrionment to incubate and inspire malicious hackers mu
  • Well... (Score:3, Insightful)

    by soliaus ( 626912 ) on Monday September 22, 2003 @02:03AM (#7022584) Homepage Journal
    There are already first ammendment issues, thats a given with something like this.

    The real question is, why wont symantec create software that will deal woth these issue as they arrise. It seems like someone is trying to take the load off the company. It would be like Ford trying to make the speed limits of all roads 10mph. Now, they dont have to worry soo much about making a safe car, as accidents are less likely to occur.

  • Obtaining power (Score:4, Interesting)

    by panurge ( 573432 ) on Monday September 22, 2003 @02:05AM (#7022589)
    Schwarz wants this because it is a way for Symantec to gain power. Briefly, if these activities are criminalised the income for lawyers will go up, but so will the income for expert witnesses and analysts - which means Symantec is in a position to sell what are effectively consulting services at the higher prices that start the moment the legal clock starts ticking. They are also in a position to gain more influence in Washington because they would be seen as being in a position to advise representatives. If Symantec could effectively corner the market in expertise over a law they themselves have been involved in drafting, they would also gain influence in the IT industry because of their ability to influence the government in matters concerning software design and deployment, thus having some measure of control over other companies.

    As Shaw said, patriotism is the last refuge of the scoundrel. Applied judiciously, it can also be very profitable.

  • by MoralHazard ( 447833 ) on Monday September 22, 2003 @02:10AM (#7022609)
    ANother poster mentioned that this would be a really bad idea for Symantec because they stand to profit from MORE viruses and worms, and more illegal activity in general. If this were true, this fool would never have mentioned this idea in public, let alone made a serious proposal.

    But it's NOT true that a law like this would diminish incidents of new viruses and worms. Like the article says, it's already illegal to hack, and yet we still have hackers. Why?

    1) 99.9% (or some similar ridiculous figure) of damaging incidents never lead to a prosecution--too little monetary loss to justify law enforcement attention.

    2) Lack of willingness by private sector companies to report (and therefore allow legal penalties to accrue) computer security incidents--they don't want the bad publicity.

    The existing laws don't work because they're not enforced often enough when violations exist, either because the violators aren't caught or because prosecution/investigation isn't done. So a new law will do WONDERS, I'm sure, to further intimidate those script kiddies.

    It's obvious, though, just how much Symantec could gain from this--goodbye non-commercial security clearinghouses! You'd violate the law to post to an open forum, so nobody will bother (I'm sure Synamtec would contribute resources to policing that aspect), and so there won't be any good open, public security resources. That gives Symantec the perfect market opportunity to fill the vacuum with a new pay-for-info service on pending bugs. The creation of a commercial relationship with subscribers gets them a free pass on the new law (it's not really public, more like those $1500 Gartner reports). And we all get fucked in the meantime.

    This is so fucking transparent. I hope that boycott idead gets off the ground--I'd start it, but me and mine are all off Symantec, anyway.
  • I swear, there needs to be a check after each law is passed such that it is even legal!

    How many laws would we have today if they were checked before they were put into action by the high court of the land. Just even for that nasty bill of rights kinda deal.

    Talk about checks and balances.
    • How many laws would we have today if they were checked before they were put into action by the high court of the land.

      I assume you are referring to laws passed in the United States. If so, it is a long-established principle of constitutional law that the Supreme Court (and the inferior federal courts) do not issue advisory opinions. "The province of the court is solely to decide the rights of individuals." Marbury v. Madison.
      • In my post I specificly mentioned the Bill of Rights. If that does not have something to do with, "The province of the court is solely to decide the rights of individuals." (Marbury v. Madison.) then I don't know what does.
        • In my post I specificly mentioned the Bill of Rights. If that does not have something to do with, "The province of the court is solely to decide the rights of individuals." (Marbury v. Madison.) then I don't know what does.

          The Court's statement signifies that it only settles disputes that arise between parties (i.e., individuals in most circumstances). These disputes have to satisfy the "case or controversy" requirement of Article III of the Constitution. To establish a case or controversy the plaintiff
          • I understand that without a crime there can be no test of a law due to what you have just established. Or to put it another way, without a party that has been wronged there can be no case that can be brought before the high court to rule upon.

            Ok, right. So what we are saying here is that, its ok to pass laws that aren't legal until the wrong someone. And then when they get wronged they have to go though the *whole* court system before they finally get ruled on and then maybe if your lucky the high court
            • All of that takes time, money, and much much effort. But hey, it's ok because you can site some reference in the original constitution (Where I'm quite sure the founder fathers envisioned it that way.) to where that makes it so.

              Here's the thing: Legislatures don't typically pass blatantly unconstitutional laws (folks in the peanut gallery please save your PATRIOT Act jokes). So, courts rely on sufficiently interested parties (and injury in-fact is usually a good proxy for interest) to provide them with
  • by segment ( 695309 ) <sil AT politrix DOT org> on Monday September 22, 2003 @02:23AM (#7022636) Homepage Journal

    Security software industry veteran Amit Yoran is expected to be named the new head of federal cybersecurity by the U.S. Department of Homeland Security (DHS) on Tuesday. ... Yoran stayed on as Symantec vice president of worldwide managed security services operations, according to Symantec spokesman Cris Paden. Yoran was well regarded at Symantec, Paden said. Infoworld [infoworld.com]
    I've said it before, and I will say it again, hiring Yoran is going to produce a huge conflict of interest, and it seems it has already started. Personally I think this comment was made solely to gain a favorite view in the government's eyes. Remember government spends millions on pork barrel garbage, and I'm sure Symantec is looking forward to riding the gravy train back and forth.

    All aboard!

  • my worst fear when Symantec bought SecurityFocus was the ability to exercise free of speech and free research on bugtraq... now it is just matter of time when corporate censorship begin to infect what can be said, research, discused or developed on the mailing list.
  • why is it that... (Score:2, Insightful)

    by infonick ( 679715 )
    the confused people seem to get into high places to deturmin the fate of millions?

    "Laws that forbid the unrestricted distribution of information...make ignorant only those who are neither inclined nor determined to commit crimes...Such laws make things worse for the victim and better for the criminal; they serve rather to encourage than to prevent unauthorized access to computer systems, for an insecure system may be attacked with greater confidence and ease than a secure system."

    The other side is that
  • by Satan's Librarian ( 581495 ) * <mike@codevis.com> on Monday September 22, 2003 @02:47AM (#7022700) Homepage
    Obviously, this is stupid. Outlawing such information will, at best, make it hard for programmers to learn enough about the different types of viruses out there, the techniques they use, and the methods to protect against them.

    In otherwords, if you outlaw the legitimate dissemination of information regarding viruses and how they are made, you just made writing a GPL or BSD licensed antivirus program illegal - obviously anyone involved in such a project would have to break the law to obtain virus samples, disassemblies, and information. This might be good for Symantec, but it sucks for the rest of us.

    However, there is a problem. There's a ton of viruses coming out every day, and the internet makes an extremely fertile ground for even a poorly written virus or worm. A simple virus or worm can literally bring a corporation's operations to a halt for a day or two - even if critical machines run moderately secure operating systems, the traffic overload and DDOS'ing from the compromised machines can be hell.

    Most virus writers are kids that feel alienated by "the system". I think most studies have shown that the average virus writer ages are between 14 and 24 - meaning when people get older and join society, they generally phase out of virus writing for moral or practical reasons. For several papers on who exactly writes viruses, go here. [badguys.org]

    So how do we prevent these kids from writing viruses? Outlawing information regarding viruses is a lot like outlawing the purchase of spraypaint - it isn't going to work, and it makes life suck for the rest of us.

    But could we find ways to engage kids within risk groups and help them find useful outlets for their talent, so they could receive positive feedback and recognition for their work instead of getting their kicks unleashing their work on the world? I bet if you got a teenager that otherwise felt the world was against him or her involved in an open-source project they got excited about, where they were tutored and provided with positive feedback by more experienced mentors - they wouldn't have the time or the inclination to write viruses and will learn some very valueable skills that will be useful to them.

    So how about this - start something similar to SourceForge for teens, and find programmers willing to donate their time mentoring these kids and helping them take their skills to the next level while teaching them the ethics and responsibilities of a first-rate programmer? Obviously such a system would need to be watched for abusive adults and any found would need to be banned and/or prosecuted, but if a bunch of good coders that gave a shit about kids did it I think it could seriously make a dent in the growth of the virus problem.

    The other solution would be to make apprenticeships mandatory for budding programmers :)

    • But could we find ways to engage kids within risk groups and help them find useful outlets for their talent, so they could receive positive feedback and recognition for their work instead of getting their kicks unleashing their work on the world?

      Something occurred to me when reading this. What if we need these kiddie's to do what they do today? These recent news makers are relatively harmless compared to the worst that can happen. If you've read /. long enough, you've seen the suggestions of what a really
      • A little bit of uneasiness now, but protection from all but the most determined adversary. And the law already completes the vaccine analogy by punishing those who are caught actually perpetrating the crime.

        Personally, I'd rather not throw kids in jail [computerweekly.com] and ban them from computer usage once they get out - that's a good way to create a hardened criminal or a very bitter and suicidal geek.

        There will always be someone writing viruses - whether for misguided political motivations, as a last gesture from a di

  • freenet (Score:4, Insightful)

    by oohp ( 657224 ) on Monday September 22, 2003 @02:54AM (#7022730) Homepage
    We'll just share them over freenet along with instructions on how to build bombs and the like.
  • by losttoy ( 558557 ) on Monday September 22, 2003 @02:55AM (#7022735)
    Guns - Guns don't kill people, people kill people.

    Hacker tools - Ban them, put anyone who writes or shares them behind bars??

    File Sharing tools - Ban them, put anyone who uses file sharing behind bars??

  • by heironymouscoward ( 683461 ) <heironymouscowar ... m ['oo.' in gap]> on Monday September 22, 2003 @03:10AM (#7022782) Journal
    The COO of a large pharmaceutical corporation explained why his firm was lobbying for a ban on all new forms of medicinal research...

    Symantec make their money from viruses. Why on earth should we take their pronouncements in any other light? Their dream world is one in which only the criminals and the megacorporations have access to the technology, so that the citizenry squashed between the two can pay a jolly penny.

    It's ridiculous. The only defense against malware is transparency, competition, and the evolution of something approaching a natural defense system. Not suppression of the tools people need in order to develop their defenses.
  • by biftek ( 145375 ) on Monday September 22, 2003 @03:21AM (#7022801)
    From this thread [securityfocus.com] on Sept 12 (love the slow Australian IT press):

    I am posting this In reference to the recent Wired article which Richard Smith posted to this list. Symantec fully supports information sharing on threats and vulnerabilities and believes it is an important tool for consumers and IT professionals to gain a measure of early warning of potential attacks.

    The Bugtraq mailing list, maintained as an independent entity under the SecurityFocus brand, remains one of the most respected and open sources for security information and early alerting by security professionals worldwide and full disclosure is *critical to the integrity of the Bugtraq community*.

    With regards to cyber crime we need more and higher quality resources for law enforcement to work on computer forensics, and we need cooperation from government and industry to assist prosecutors in building cases against attackers.

    Given the increase in the number of security threats and the availability of online tools we also believe that the industry should focus on training and educating todaya(TM)s youth about the ethics of computer crime and its affects and impact on victims.

    These are not simply my words but also an official Symantec statement.

    Cheers,
    -al

    Alfred Huger
    Senior Director Engineering
    Symantec Security Response

  • by JRHelgeson ( 576325 ) on Monday September 22, 2003 @03:23AM (#7022805) Homepage Journal
    This is the dumbest thing I've heard. It ranks right up there with SCO's claims against IBM and Linux. Where do they come up with these delusions?

    He's stating that "Only the information security elite should ever have access to information security issues." Or if Bill Gates stated: "Only large enterprises should write operating system software. Linux should be outlawed." This means we'd all be forced to eat Microsoft's or Symantec's 'dog food'.

    I ask you this: When was the last time Symantec wrote a signature for Snort? How about a nessus plugin? They want to get rid of the open source security model because they can't profit from it!

    As an information security professional, I don't even listen to Symantec as their information is generally 2-3 weeks too late. Its like waiting for the Sunday paper to read about the double homicide that's taking place right now on your front lawn. All their info is being published after the fact! If they successfully cut off all access to information that is happening in the security community, then they make everyone reactive rather than proactive.

    It doesn't matter how much detail Symantec offers about a virus or bug. I want to be able to take an exploit, compile it and run it against a test server on a test network. Capture the packets transmitted and analyze them. I want to dissect the 'worm' or 'virus' and develop an IDS signature as well as produce a Nessus plugin to scan other servers. If I use other tools, I want to have enough knowledge to look into their signature files to realize that they're looking for the wrong stuff and thereby giving false positives (or false negatives).

    It's called FULL DISCLOSURE
    Symantec is trying to tell us that I can do all this with a really descriptive set of documentation? Or maybe I should just turn my entire enterprise security model over to Symantec. Uh huh, sure... I don't think so. Gimme the code for the exploit.

    Allow me to digress for a moment, stick with me though -- it's not too OT...
    Lets talk for a moment about the MS03-039 exploit; the brother to MS Blaster. It's a really nasty bugger. Once it exploits a machine, it creates a user account of "e" with a password of "abc#321". Oh yeah, and the new user has admin rights.

    This means the worm could use the newly created account to create other accounts, escalate privileges on existing accounts or just change everyone's password to a random string of garbage.

    The price we could pay by not patching every single server and workstation this time around could exceed the damage done by blaster by a thousandfold. All it has to do is successfully nail just one Active Directory controller. Imagine if every single user on your entire network had their password changed on them, at the same time.

    When blaster hit, it crashed the RPC service which forced the machine to reboot 60 seconds after the RPC service came crashing down. Imagine now that in the infection process changes admin and user passwords, revokes privileges, then reboots the machine... Your network is now down, and you can't even get back in. You are screwed.

    So, how do I know this info? Well, it just so happens that I've got the source code to the worm sitting on my machine right now! I'm not contributing to the project, but I'm sure as hell monitoring what is going on, and I sure as hell didn't get ANY of this information from Symantec.

    The only info I'll get from Symantec is the day after the worm's release when they announce that blaster.b is in the wild and that I should have patched my boxes, and they're very sorry but there is no cleanup file available if it compromised your AD controller and changed all the admin passwords. Symantec also recommends you have current tape backups. That's like telling the car accident victim to buckle up. Just a little late there, Jack.

    We are going to continue down the road of Full Disclosure debate until M$ et al. starts writing secure code.

  • by orthogonal ( 588627 ) on Monday September 22, 2003 @03:45AM (#7022841) Journal
    So gentlemen, what is to be done?

    I'll tell you: just what we did to Intuit: kick Symantec where it hurts, in the pocketbook, until Symantec is ready to disavow Chris Schwarz and his attempts to limit free speech and free inquiry in the name of profit.

    I've always had a soft spot for Symantec because of that awesome DOS product, Norton Utilities. And I still have a copy of Peter Norton's 8086 assembler tutorial. Just saw it yesterday, but now I can't recall which bookcase it's in.

    But no more. I'm afraid this uses up my good will, and my willingness to see Symantec as the "good guys".

    First, let's let Symantec know how we feel. The main switchboard number in the US is (541) 335-5000. The worldwide headquarters number is (408) 517-8000. Tell them you're a computer professional or enthusiast, that many non-specialists rely on you for advice, and that you won't be recommending their products again. And tell them why: because Chris Schwarz whats to criminalize people like you for warning other people about security vulnerabilities.

    And then let's do what we said we'd do:
    • don't buy Symantec products;
    • don't recommend Symantec;
    • actively recommend against Symantec;
    • and tell your friends, your colleagues, your family, exactly why: Symantec wants to suppress free speech in order to maintain a monopoly;
    • explain that Symantec wants to throw into jail (that's what happens when you outlaw something) computer professionals like yourself just because they would warn people of real threats to their security.
  • ... But not information.
  • Youd have to eliminate the ultimate tools of virus writers. The idiotic users that go around opening attachments from people that they don't know and refuse to keep their computers properly patched.

    Lets face it most virus propagation occurs because people don't know better or don't care because its not their problem. The real tool of virus writers is the willfull ignorance of the userbase. The truly sad thing about this law is it will tend to extinguish pockets of understanding.

    Oh well one more Eye fo
  • Compilers are tools available on line that can be used for malicious purposes by hackers and virus writers.

    Anyway, why should paid for tools be any different?

  • by fydfyd ( 150665 ) on Monday September 22, 2003 @04:27AM (#7022926)
    So if virus abetting tools are outlawed then I imagine that the Sale, Possesion, or Manufacture of Office would be punishable by no less than 10 years' imprisonment or fine no less than $100,000.
  • I'm curious, are there any viable open source alternative anti-virus products out there?

    I might be willing to lend a hand if anyone has such a project and needs a coder. I bet you could reduce the money available to lobby for such stupid laws by commoditizing the market and destroying the profit in creating such laws - and such a product, if done well, would benefit the net as a whole.

    I'm aware of Clam AV, but since it's POSIX oriented, it's not really a replacement. I'm thinking of something that supports modern AV features under Windows - e.g. real-time scanning, prevention of execution, modern heuristics, auto-updates, etc.

    Of course, for corporations, the best solution would probably be something more along the lines of an access control program that disallowed use of any products that weren't officially sanctioned.

  • Legitimate uses (Score:2, Insightful)

    by BinBoy ( 164798 )

    information [...]which could be used by malicious hackers and virus writers


    This is exactly the same information that's used to prevent and disable viruses.



  • by drsolly ( 415856 ) <drasolly@@@aol...com> on Monday September 22, 2003 @05:58AM (#7023123)
    This is just marketing fluff. I've seen this so many times.

    He was being interviewed by Wired, and wanted to make gruff noises about the virus issue. He's a COO, so obviously he isn't technical enough to know what he's talking about. The danger, of course, is that because he's a COO, some dimwit doesn't realise that COOs don't know anything, might take him seriously.

    If this did ever happen, it would be disastrous for Symantec and the whole antivirus industry. Not because there would be fewer viruses - that would be almost unchanged.

    The disaster happens in the sharing of specimens of viruses. In order to code up detection, identification and repair, you have to have one of the things youj're trying to handle. So, where do antivirus companies get specimens?

    Two sources. 1) from their customers. This legislation would make it illegal for customers to send speciments to the AV companies using email or whatever. So what you gonna do, copy it onto a floppy disk and put it in the post? Not likely.

    2) From the other AV companies. There's been an agreement in place for a great many years between the techies of the AV companies, that specimens get shared, so that when a new thing surfaces, customers aren't forced to buy an AV from any one source, customers still have choice. That specimen sharing would become criminalised.

    I've just written to some people to explain that if they really want people like me (and you and you and you) to send them specimens of things that turn up, then they mustn't criminalise that.
    • It's good to see you posting :) It sounded from the BugTraq article [securityfocus.com] that Alfred posted that there was a bit of internal backlash already, but with some of the founders of the industry making waves one can hope that Symantec will make the sensible decision and never allow their clueless management and marketing fluff to go in front of government legislatures again.

      I'm curious - what do you think of my suggestion [slashdot.org] for reducing the number of kids in virus writing? I know it would be very ambitious, and woul

  • by rikkards ( 98006 ) on Monday September 22, 2003 @06:04AM (#7023137) Journal
    make it a criminal offense to share information and tools online

    I guess that makes MS Visual Studio and MSDN illegal?
  • by Jerk City Troll ( 661616 ) on Monday September 22, 2003 @06:07AM (#7023141) Homepage

    I noticed you can still go into the hardware (screw drivers, power tools, etc.) section of Sears and buy bolt cutters. Bolt cutters have a legitimate use, even when used for cutting pad locks. However, I am sure that some have used them to gain illegal access, somewhere! Quickly, someone tell the government so we can make them illegal!

    Of course, if Symantec has their way, they'll also make security testing illegal too. Idiots.

  • by ClubStew ( 113954 ) on Monday September 22, 2003 @07:07AM (#7023333) Homepage
    Don't kid yourself, there are plenty of others out there just like them who would like nothing more than to make the so called 'security community' an exclusive club open only to corporate types who see things their way.

    So, I guess the MS.Blaster worm was only propagated by corporate - and most often firewalled - networks? It wasn't caused by the vast numbers of broadband customers with entirely open computers on countless networks? Hmm.

    The remarks that this statement targets (it was a statement made against Symantec) are uderly rediculous. The way to get things done is not to remain hush hush. NTBugTraq often forced Microsoft (et. al.)'s hand to fix a bug that was proven in concept but, perhaps, not yet exploited. It was only a matter of time before the hole would be exploited. If Symantec is turning their efforts of keeping machines "safe" to the "corporate machine", they aren't getting my or my company's business anymore. We need someone that will push to get bugs fixed and viri stopped at all costs - even if it means putting pressure on the publisher.

    Besides, almost any post-back news site and development community on the 'net would be liable if such a law was passed. My email address is obtainable from this site and many others (SPAM-proofing aside, which isn't always hard to break if the crawlers look for common patterns). They're sharing my email address and, perhaps, other information.

    If it's community backlash they're merely trying to avoid, then it's community backlash they deserve.

  • Apparent Misquote (Score:3, Informative)

    by KrispyKringle ( 672903 ) on Monday September 22, 2003 @07:41AM (#7023486)
    It's probably worth pointing out that this discussion took place on Bugtraq, the Symantec-owned full-disclosure mailing-list, a few days ago. Apparently, this is more of a misquote than anything. See http://www.securityfocus.com/archive/1/337333 [securityfocus.com].
  • by gone.fishing ( 213219 ) on Monday September 22, 2003 @10:33AM (#7025005) Journal
    I've never responded to a Slashdot post without first reading the article and a number of comments before but this time I am just climbing straight up on my soapbox!

    I know this is outlandish but I propose we outlaw knives because they can be used to kill someone. History shows us how dangerous the knife is; For generations, the knife in various forms has been used to kill and maim people. Therefore, I think we should outlaw it. While we are at it, lets outlaw hammers, candle sticks, and rope since they have all been used to kill people.

    My point is that tools sometimes have to be dangerous in order to do their jobs. It is not the hammers fault if someone decides to use it to bash someone's head in! The same is true for the knife. Software "hacker's tools" are tools, just like hammers and knives. They can be used for good (and usually are) or bad (and sometimes are) but that does not mean they should be outlawed.

    You know those "emergency hammers" that they sell to break car windows with? My guess is that more of them are sold to car-burgulars than are sold for their legitimate purpose. They are easy to conceal and break windows with a minimum of noise and fuss. Crooks use them every day. Why hasn't there been a cry to have those things outlawed, regulated, or controlled? It is because they are a tool, that the tool has a legitimate purpose, and that the crooks would simply use something else if it were made unavailable to them. I guess I'd rather have them carrying these hammers than a hatchett. Of course, I would rather see the crook in jail where he would have neither.
  • by Jerry ( 6400 ) on Monday September 22, 2003 @11:45AM (#7025652)
    Translation: We can only close the door after the fox has raided the henhouse. Util we see how he does it we can't make an anti-pick device to prevent them from breaking in the first million times.


    Of course, making anti-pick devices (exploit tools) illegal won't interfer with the activities of the criminal class any more than making firearms illegal has bothered them. This CEO is just another in the class of people who just can't seem to grasp the fact that lawbreakers don't care about laws.


    The tools that create exploits are the tools the create software: lanugages and compilers for them. A case can be made that the Corporations real agenda is to gain control of the tools for making software. If your product isn't needed by the Linux platform then the Linux platform is your enemy. If they get compilers outlawed only outlaws will use them. It won't stop the flood of WinXX infectors, as if Symantec wanted that flood to stop their only income stream, but it will stop folks from migrating away from WinXX to a platform that doesn't need their Symantec's software.

No spitting on the Bus! Thank you, The Mgt.

Working...