Comments: Know your enemy - Interview with a hacker

The Alliance of Regulatory blind eye treatment to criminal enterprises in order to obtain on the fly intelligence has been well known for years. The two horns of this problem are how does a nations state or those that see themselves as one gather intelligence without increased cost and accountablity. The Criminal Enterprise is the solution, it is self funding only requiring a blind eye not really spending any hard currency. So acceptable levels of crime are good for entities that require intel and cannot be seen as paying for it. Terrorist use drugs to fund their efforts and trade with organized crime entities for retail distribution. The organized crime entities use hackers to obtain the information for their fraud networks. While the organized crime groups never endorse the political objectives of the terrorist they have information on them via the relationship of drugs to retail distribution and they make that availible when pressed to do so to the regulatory entity. The organized crime entity has another point of access to profit from the telemarketing and electronic fraud game including stock scams. The only issue here is that the acceptable level of crime by the organized crime entities enforces a non working intel groups sponsored by the regulatory entity. So at some point left unchecked the terrorist and the cirminals cross the line. The hacker fits into this scenario as a free agent that can decide who and when he wants to play with. This issue is not determining what makes them tick but rather finding them and using them for your own purposes. The same efforts used for ones personal efforts could prove profitable since the blind eye cannot decide if the criminal act is friend or foe they look the other way regardless. The only risk is the discovery by the terrorist or the criminal entity since the only time regulatory efforts seem to work is when they are informed by either a Terrorist or Criminal Entity. The key to any effort legal or illegal is keep it small cover your tracks and find information gatherers like hackers and earners to carry out your plan. By not getting greedy and not confronting competition you avoid the sting set ups and informants found to be the undoing of any entity. Imagine if you will the trade secrets of Google spliing out all over the net for Yahoo to see. That would be criminal and violating Googles property, why isn't Google attacked? The profile would be too high and cost to much in bad press and render the regulatory eye alive not dead. Never compete, innovate it is better to fish alone rather than with a fleet. At some point the other entities profiting from these efforts will look to control you. Never share information unless you are an equity owner in all the aspects including all the risk and never sell to strangers. These are all the same rules for drug dealing another form of acceptable criminal activity. The same scenario regulators use on drugs fits for fraud and hacking if you are small or seen to be they will avoid you since they all want the big trophy for the mantel. Never pay for the blind eye just go where they cannot see its easier than having to pay information in future. Avoid situations where leverage might be applied to you detach your vices from your activity. David Levine was picked up on coke charges first then turned the rest of the Milliken crew over to avoid a life term. Avoid people that have vices seek those that have low profiles, good skill sets, and never talk much beyond what they know. Never work with people that have gone to jail for any reason they have already turned or can be expected to quickly. Find the place that is safe then find another and another. Schedule your fraud for amounts under $10,000 and limit exposure to under 200 people, never run a fraud using the same bank account you used before and never use the same name twice. Moving at least the location of your server is critical. Never show up any where so that those that might id you know what you look like. In essence go underground, avoid everyone, trust no one, and plan your escapes at multiple levels.

Posted by 111 at October 9, 2004 07:51 AM
MT::App::Comments=HASH(0x55ab84aeb690) Subroutine MT::Blog::SUPER::site_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.