if our goal in sentencing is to reduce such
crimes, you have to ask how sending kids to prison accomplishes that
Sometimes, emotions make it difficult to see the
most effective way of accomplishing an objective. And emotions can definitely
arise when the subject is underage cyber thieves.
Security blogger Brian Krebs (Krebs On Security) recently took a hard line
stance in opposition to the lenient sentencing of a Finnish 17-year-old,
who was found guilty of 50,000 cyber crimes “including data breaches, payment
fraud, operating a huge botnet and calling in bomb threats.” Julius
Kivimäki was given a two-year suspended sentence and ordered to pay the
equivalent of about $7,200. The judge pointed to the youth of the defendant,
noting that he had been much younger when some of the crimes were committed,
that it was his first offense, that he had already served some jail time while
awaiting the trial to start and, perhaps most crucially, that no one was
physically hurt by his crimes.
There are some infuriating elements to this
story. For one thing, Kivimäki said he was affiliated with cyber thief group
Lizard Squad. After the sentence, as Krebs noted, the defendant changed his
Twitter profile to “Untouchable hacker god.” And, he added, “the Twitter
account for the Lizard Squad tweeted the news of Kivimäki’s non-sentencing
triumphantly: ‘All the people that said we would rot in prison don’t want to
comprehend what we’ve been saying since the beginning, we have free passes.’”
The attitudes reflected by those actions are
incredibly galling, but the real questions are whether the sentence that was
handed down will keep the young cyber hoodlum from returning to his old ways
and whether it will keep others from following in his footsteps.
As for the first question, recidivism, Kivimäki
will be subjected to extreme monitoring that will make it quite difficult for
him to launch attacks, at least not without getting caught. With his ability to
do the things he used to do severely crimped, he just might discover that going
legit via security consulting can be far more lucrative than launching
cyber attacks, as legendary cyber thief Kevin Mitnick quickly learned.
But much of criminal sentencing is not focused
on preventing the defendant from committing more crimes. The punishment, being
in a very public forum, can serve to prevent others from committing similar
crimes. Put another way, if punishing one teen stops 10 other teens from
committing similar crimes, society deems it worthwhile. That’s a fair point, if
true.
But the kind of antisocial teens who have the
skills and inclinations to successfully execute cyber crimes tend to be cocky
sorts, members of a group whose worldview precludes the possibility of getting
caught. So you have to ask, is it more likely that a harsh sentence for one of
their ilk would get these punks to stop their attacks, or that it would anger
and embolden a subset of them to launch revenge attacks of more consequence
than anything they had done before?
I am no fan of the people who launch these
attacks — calling them “scum” offends the ordinary scum populating our
communities — but greater than my desire to see them suffer is my desire to
reduce the number of attacks. I don’t think that a harsh sentence such as Krebs
advocates would have done that. What is the answer, then? Prevention.
IT and law enforcement have to focus more on
making cyber attacks ineffective and far more time-consuming and expensive. On
the IT side, data breaches and payment fraud are already being dealt with, and
the sooner the industry sees security as essential and not merely an
inconvenience, the better. Time and again, I run into payments companies, mobile
players and retailers that dilute security for the sake of shopper convenience.
That kind of mind-set deprives those companies of the right to complain when
they get hit by fraud. If you choose to weaken security, you have to pay the
price.
As for law enforcement, some of the offenses of
the 17-year-old were calling in bomb threats and swats (calling police to
falsely report a crime, with the sole objective of embarrassing,
inconveniencing and harassing someone). Law enforcement must respond to such
calls, but commonsense due diligence is often skipped. It can’t be. Swatting,
with real-life SWAT teams, could easily lead to death if something goes wrong.
I’m reminded of my interactions with one of the
earliest famed cyber criminals, namely Robert Tappen Morris. His claim to fame
is that he created the Morris Worm, way back in 1988. He was the first person
convicted of the Computer Fraud and Abuse Act, following a three-week trial in
Syracuse, N.Y., that I covered.
Morris, a graduate of Harvard and a Cornell grad
student at the time, was also the son of the National Security Agency’s chief
scientist. He unleashed his worm specifically to prove the security weaknesses
of the Internet. He hadn’t intended to crash the Internet, but he made a math
error that caused the worm to replicate out of control.
IT people all over the world called for his
head, but the federal judge gave Morris probation. Having observed him for
weeks, I thought the sentence was just; I saw no sense in sending Morris away
to prison. Morris today is a tenured MIT professor and a partner in Y
Combinator and other ventures. Nearly 25 years ago, he did something very
stupid, but he had a noble goal: to make everyone aware of the Internet’s
security holes so that they would fix them.
Julius Kivimäki had no such noble goal. But the
issue is the same. If the point of sentencing in such cases is to reduce
cyber attacks, prison isn’t the answer. Vengeance has its place, but I’d rather
prevent attacks than imprison teens.
No comments:
Post a Comment