Information Warfare: May 27, 2002

Archives

Over the last few years, it became known that the hacker underground was fond of hanging out on password protected chat rooms (often run from servers or user PCs they had infiltrated). Here, the teenage script kiddies and older black hat hackers trade information and software. There are also public, semipublic areas where this sort of thing is discussed, but the private areas are where Internet vandals are more likely to drop their guards, as well as nuggets of useful information. Intelligence agencies, and computer security firms, have taken advantage of this and monitor these venues, often without the knowledge of the hackers hanging out there. The public venues are also monitored, in order to get an idea of what the trends are among the Internet vandal community. One Internet security outfit, TruSecure, admitted that they monitor 800 hacker groups and collect 200 gigabytes of messages a day. This massive amount of material can be automatically searched to come up with useful information, as well as statistics on trends and the probability of what Internet horrors might be coming next. 

X

ad

Help Keep StrategyPage Open

First came Facebook, then came Twitter, and finally, AI has arrived. They have all caused a decline in our business, but AI may be the deadliest innovation. We are currently in survival mode. Our writers and staff receive no payment in some months, and even when they do, it is below the minimum wage for their efforts. You can support us with your donations or subscriptions. Please help us keep our doors open.

Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on X.

Subscribe   Donate   Close