Big Brother Awards
quintessenz search  /  subscribe  /  upload  /  contact  
/q/depesche *
/kampaigns
/topiqs
/doquments
/contaqt
/about
/handheld
/subscribe
Linuxwochen Österreich Tour
RSS-Feed Depeschen RSS
Hosted by AKIS
<<   ^   >>
Date: 2003-01-10

MS/Charney: Hacket nicht, Kinder

Eltern, wachet über Eure Kinder und bringet der Jugend "Goldene Regeln" bei, auf dass sie nicht hacken tue. Der Verfasser war vor seinem Leben als "Microsoft Security Officer" ein Officer der anderen Art. Maßgeblicher US-Drahtzieher hinter dem "Cybercrime-Convention" des Europarats, davor war er bemüht, über den Wassenaar-Vertrag die Ausbreitung von Krypto zu verhindern.
-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-.

Was Scott Charney sonst noch gemacht hat

http://www.quintessenz.org/cgi-bin/index?s=1&q=Charney

Aufgrund der diesem Posting eigenen Bigotterie wird es ausnahmsweise im Volltext weitergegeben. Es stammt von Mich Kabays exzellenter Mailing List.
http://www.nwfusion.com/newsletters/sec/index.html

Teaching the Golden Rule in the Computer Age

By Scott Charney

With each new report of a young person caught hacking into a
computer system or circulating a computer virus, we get another
stark reminder that for some kids today, traditional notions of
ethics and piracy are missing, at least when they log on to
their PC. But it's not entirely their fault. If you compare
just how differently computer technology enters our kids'
lives, as compared to the way previous generations learned
about powerful technologies, you realize that kids need our
guidance to learn and apply old rules to new technology.

Think about other powerful tools, such as automobiles.
Automobiles are given to adults first, and then those adults,
whether parents or teachers, educate younger individuals on the
appropriate use of the technology. Computers, of course, are
introduced in exactly the opposite way; children are given
access to a powerful technology that, too frequently, neither
their parents nor teachers fully understand.

In the days before script kiddies (unsophisticated hackers who
run powerful hacking tools), a victim such as the U.S.
government could often tell whether a hacker was a serious
threat. A hacker who was hunting and pecking on the keyboard,
or having difficulty with programming syntax, was clearly
unsophisticated. In such cases, it was sometimes appropriate to
deal with the hacker by discussing his behavior with his
parents. The scenario was often the same. Federal agents would
explain to shocked parents that their son (it was almost always
a boy) was hacking into the U.S. Department of Defense; the
parents would respond with the same three statements: (1) it
was great that their son had a hobby; (2) it was a high-tech
hobby which might be of future value; and (3) at least their
son was safely in his room and not out roaming the streets.
These answers were all true but missed the basic point: adults
needed to take responsibility and manage their child's use of
this powerful technology.

What brought the problem into sharper relief were presentations
to youngsters about computer ethics and respect for privacy.
When asked if they would read their friend's diary or enter a
neighbor's home if a window was open, the answer was "no." But
when asked if they would hack another person's machine, the
answer was often "yes." The reason, of course, that children do
not read a friend's diary or enter a neighbor's home has
everything to do with education. Children are taught, at a
young age, to respect the physical property rights of others.
Unfortunately, adults did not react to the explosion in
information technology with a massive campaign on ethical
computing.

In sum, there has been no one to pass along society's
collective rights and wrongs for PC use and Internet browsing.
So kids do what kids often do when there's little adult
guidance; they look to each other or develop their own rules,
sometimes with costly and potentially dire consequences. For
example, a young hacker in Massachusetts disabled an electronic
telephone switch, preventing airlines from remotely switching
on landing lights at a regional airport and forcing planes to
be rerouted to other airports. Computer viruses spread by
hackers, including some quite young, have collectively caused
billions of dollars of damage to governments, businesses and
home PC users.

Even more troubling are the implications of seemingly innocent
hacking in a post-Sept. 11 world. Security experts must waste
precious time and resources investigating all electronic
intrusions, and could miss a potentially catastrophic attack
while investigating a hacker with little or no evil intent.

The future of some of our most talented youth is also at risk.
Once the unchanneled talents of young computer whizzes lead
them to the wrong side of the law, there's a strong possibility
that they will get stuck there and eventually tarnish their
future with a criminal record.

As educators and parents, there are things we can do. We can
learn more about what our kids are doing during those endless
hours they spend online. We can take the time to learn about
the risks, set appropriate rules, and regularly talk to our
kids about these guidelines, ones that mirror the standards we
set for our kids in other parts of their lives. Simply put, if
it's not OK for Johnny to snoop in his sister's hardbound
diary, it shouldn't be OK for him to crack the password of a
private e-mail account and read another family member's mail.

That said, we shouldn't stifle young people whose talent and
perseverance allows them to master and manipulate sophisticated
technology. We should harness this talent to benefit these
young people and society. Let's consider offering more lawful
contests that challenge young people to test the security of
computer systems. We might also create programs that help young
people further develop their interest in technology into
successful, lifelong careers.

If we are successful, things will hopefully be different when
today's young people hand over the keys to the family computer
to their kids.

- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-.
edited by Harkank
published on: 2003-01-10
comments to office@quintessenz.at
subscribe Newsletter
- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-.
<<   ^   >>
Druck mich
Linuxwochen Austria

meet q/uintessenz every friday

BigBrotherAwards





25. Oktober 2017
freier Eintritt
#BBA17
Big Brother Awards Austria
 /q/depeschen
 


 CURRENTLY RUNNING
bits4free 18. Jan. 2012: Ihre Meinung zählt
Liquid Democracy - direkte Demokratie durch Online-Partizipation?
 
 !WATCH OUT!
q/Talk, Di 29. Nov: Es gilt die unSchuldsvermutung!
Bürger unter Generalverdacht und stundenlange Einvernahme von Chattern