| Date: Thu, 11 Mar 2004 
      07:21:31 EST  Subject: very good anti hacking advice from Tom Bearden 
          
          John, 
        
          
          Yes, if one is active on 
          the internet and does not have spyware defense on one's computer, one 
          seriously needs it these days. For one added benefit, it will almost 
          100% eliminate the silly but nefarious "pop-ups" that are so rampant 
          these days, and that literally drive one up the wall otherwise. 
        
          
          I personally use Spy 
          Sweeper, which has proven ideal for my own needs. I'm behind a 
          hardware router, a firewall (Black Ice), intensive antivirus checking 
          (Two Norton suites), and intensive spyware checking (Spy Sweeper).  
          And when I installed Spy Sweeper and did the first system sweep, I 
          really got a shock. My computer was in fact infested with a dozen or 
          more very sophisticated spies, plus many dozens of the standard 
          nondamaging but irritating type. The program found and eliminated them 
          immediately, and by continuously checking in the background these 
          days it has very successfully fended off most of them since. But one 
          has to do a sweep check of one's system for spies, periodically, the 
          same way one has to do a sweep check for viruses etc. One also has to 
          continually download and install spysearch updates, similarly to the 
          way one does for antivirus software updates. 
        
          
          And by the way, it isn't 
          only the "bad guys" who are into everyone's computers these days. Some 
          other "legitimate" folks are into very wide spying on the net, which 
          can be very surprising. Much of this is legal under some new laws and 
          regulations, and some of it is illegal because of the identity of the 
          folks not authorized but doing it anyway. These folks also 
          continuously scan the net (sorta like a continuous set of google 
          searches) for certain words or arrangements of words. Simply repeating 
          a news item with these word combinations can sometimes attract some 
          very strong and undue attention from these surreptitious folks. Since 
          I use such words of interest frequently, obviously my machine became a 
          favorite target. About three years ago, the main Bell South technical 
          internet engineer, charged with action against hacking and external 
          interference, did take on a task to root out some of these piranhas 
          attacking my machine, and he did the job, much to my relief. He also 
          was tied into the "superhacker" community, and had no great problem in 
          doing that job.  These days, many large companies actually hire 
          superhackers of their own, since they have found that for some things 
          that is the only way to have parity with, or hopefully an advantage 
          over, the criminal hacker community. 
        
          
          Further, many of the 
          viruses and Trojans etc. are now made deliberately by 
          counter-information warfare specialists in foreign nations. In 
          essence, there are miniature "information wars" or "information war 
          games" of sorts going on continuously, where each "side" continually 
          tries out its techniques etc. against the other side, etc. Sorta like 
          young fellows these days having gone ga-ga over paint gun wargames. A 
          strange kind of information "cold war" is thus ongoing, partially in 
          dead seriousness and partially as some kind of "gaming". 
        
          
          Fortunately a good spyware 
          program is also continually updated, so one can keep it up to date for 
          a small annual subscription fee. 
        
          
          Nothing gives 100% 
          defense, but sufficient barriers and determined updating as well as 
          persistent checking can get one to 99.99% or so. It is also absolutely 
          mandatory that one keep frequently downloading and installing security 
          updates from Microsoft etc. and/or the other major software 
          manufacturers. There are certain websites, e.g., where experts will 
          freely examine the security of one's system for open ports, etc. and 
          give one a direct report on their examination results. The very 
          Microsoft software itself also has serious exploitable loopholes, 
          which Microsoft is now giving very urgent attention to, after taking 
          lots of flack on their rather sloppy security programming initially. 
          To their credit, Microsoft seems to now be strongly searching, 
          finding, and fixing these bugs as rapidly as it can. However, 
          Microsoft also gets lots of inappropriate flack because of things like 
          3rd party drivers etc. which do not properly mesh with Microsoft's 
          software and cause lots of bugs and crashes of the fundamental 
          Microsoft software, to prevent undue damage to that primary system 
          software. Much of the crashing of Windows, e.g., is actually due to 
          bad drivers and ancillary programs from other manufacturers, etc. 
          rather than to the modern Microsoft software with applied changes and 
          updates. 
        
          
          Also, at one time 
          after destruction of two hard drives, and continuing massive attacks, 
           I had to request informal "back channel" help from some real 
          superhackers (the good guys who love the art with a passion but also 
          thoroughly detest those weasels who misuse it to damage computers and 
          private property such as files, etc.) That was a real education. What 
          many of those "supercats" can do in and on computers, has not yet been 
          written in the textbooks and will not be for some years. They very 
          kindly and very graciously did solve a formidable problem I had, and  
          in record time. I refused to ask what really happened to the attacking 
          consortium of computers. For my purposes, those hostile machines and 
          their hacking simply disappeared from any further attacking of my 
          machine. 
        
          
          If a "particularly tough" 
          problem does arrive, most substantial universities have formal or 
          informal groups who study the art of computer hacking in more depth, 
          and there are usually some of these groups who do come to the 
          assistance of others as needed.  The best part is that they also have 
          informal but direct contact with the real "superhackers", some of whom 
          are never mentioned anywhere in any publication, but who are literally 
          living legends in that "underground" world. And so a rather nebulous 
          but real pipeline does exist whereby with some sustained and 
          persistent effort one can request and get assistance from the real 
          world experts, if such a critical need arises. 
        
          
          In *****'s case, the real 
          "spooks" might mess with direct computer hacking a bit, since legally 
          they will have all the "back doors" used in building the software 
          itself. But for real sustained work they will just establish a site 
          down the road from him a bit, where they will detect all his targeted 
          computer's emanations by Tempest techniques (standard practice in the 
          EM countermeasures game). So they will have computers and a team 
          there, where on a computer screen there continually appears a direct 
          imaging and duplicate of the targeted computer's functioning, as Myron 
          works, with good accuracy. In that case, they simply read what one 
          writes as soon as one writes it, and record it as desired. Much of 
          that is automated to a high degree.  Several other foreign nations -- 
          particularly the Russian FSS/KGB and some former iron curtain 
          countries -- use these Tempest techniques also. 
        
          
          The real mess is usually 
          made by those brilliant but misguided idiots who get their jollies 
          from penetrating and damaging private computers and files slyly. There 
          what is really needed are some much more stringent criminal laws and 
          much stronger law enforcement. One cannot go down the street attacking 
          and mutilating private parked cars with impunity, and one should not 
          be allowed to also attack and damage private computers and their 
          information with near impunity. One cannot design and build bombs to 
          destroy cars and buses, and one should also not be allowed to 
          willy-nilly build viruses and trojans etc. to degrade and misuse 
          targeted systems and persons. 
        
          
          Best wishes, 
        
          
          Tom Bearden 
       |