Feeds

Feds turn one in four black-hat hackers into snitches

Cracktivists beware...

Using blade systems to cut costs and sharpen efficiencies

One in four criminal hackers turn snitches under pressure from US authorities.

The FBI and US Secret Service – the two lead agencies in the fight against cybercrime in the US – have used the threat of prison to create an army of informers, according to an investigation by The Guardian. A climate of mistrust has been sown among criminal hackers as a result of this process.

Hacker turncoats running carder forums – under instructions from FBI handlers – have acted as sources of intelligence for subsequent prosecutions. In other cases, undercover agents have run underground forums as part of sting operations.

Eric Corley, publisher of hacker quarterly 2600, estimates 25 per cent of hackers (crackers) operating in the US might have turned stool pidgin. "Owing to the harsh penalties involved and the relative inexperience with the law that many hackers have, they are rather susceptible to intimidation," Corley told The Guardian.

John Young, who runs whistle-blowing website Cryptome, said mistrust among hackers is growing rife. "There are dozens and dozens of hackers who have been shopped by people they thought they trusted," he said.

Convicted hacker turned security consultant and author Kevin Mitnick, who ought to know a thing or two about such things, argued that if anything the one in four figure is on the low side. "I want hear about *any* hacker cases with multiple defendants where no one snitched. Anyone? I think 25% is a LOW," he said.

The best-known example of a hacker turned informant is Adrian Lamo, who put the authorities on the trail of presumed WikiLeaks source Bradley Manning. Other examples place the tactic of running informants in a far less favourable light. For example, Albert Gonzalez masterminded the hacking of credit card databases maintained by TJ Maxx and Heartland Payment between 2005 and 2007 while simultaneously acting as a Secret Service informant.

The timing of The Guardian investigation could be seen as an attempt to sow distrust among the ranks of Anonymous and other mischief-making hacking groups, such as LulzSec, which has been very busy of late hacking into systems maintained by Sony and (even more provocatively) FBI-affiliated organisations. A number of alleged Anonymous members have already been arrested in the US and UK, providing a potential source of turncoats. Or perhaps that's just what the feds would like cracktivists to believe... ®

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.