Forgot your password?
typodupeerror
Security The Internet Technology

Symantec Wants To Use Victims To Hunt Computer Criminals 139

Posted by ScuttleMonkey
from the cyber-vigilante-network dept.
Hugh Pickens writes "Business Week reports that security experts plan to recruit victims and other computer users to help them go on the offensive and hunt down hackers. '"It's time to stop building burglar alarms to keep people out and go after the bad guys," says Rowan Trollope, senior vice-president for consumer products at Symantec, the largest maker of antivirus software. Symantec will ask customers to opt in to a program that will collect data about attempted computer intrusions and then forward the information to authorities. Symantec will also begin posting the FBI's top 10 hackers and their schemes on its Web site, where customers go for software updates and next year the company will begin offering cash bounties for information leading to an arrest. The strategy has its risks as hackers who find novices on their trail may trash their computers or steal their identities as punishment. Citizen hunters could also become cybervigilantes and harm bystanders as they pursue criminals but Symantec is betting customers won't mind being disrupted if they can help snare the bad guys. "I'm convinced we can clean up the Internet in 10 years if we can peel away the dirt and show people the threats they're facing," says Trollope.'"
This discussion has been archived. No new comments can be posted.

Symantec Wants to Use Victims to Hunt Computer Criminals

Comments Filter:
  • by flymolo (28723) <{flymolo} {at} {gmail.com}> on Friday September 04, 2009 @03:50PM (#29316085)

    How many of these scams and hack originate in the US anyway? Will their customers really have information to share?

    • @flymolo: "How many of these scams and hack originate in the US...?"

      Probably at least as many as originate in China and Russia.

    • by Romancer (19668) <romancer@de3.141 ... oor.com minus pi> on Friday September 04, 2009 @04:00PM (#29316245) Journal

      And the countdown to a DOS via spoofing a report to symantec of malware propogation..... Begins.

      • by cnvandev (1538055)
        Personally, I'm curious to see what happens when the results become...tampered [time.com]...
      • This reminds me of Slashdot discussions on how to filter SPAM mail. The problem is that every mechanism can be turned against you. Otherwise collecting data to isolate infected computers would solve the problem.
    • SANS ISC has already been doing this for years. http://isc.sans.org/top10.html [sans.org] Old news. The only thing different will be data from non-corporate home users who opt in.
      • SANS points to top IP addresses. According to TFA this is supposed to point to top hackers. I have some doubt about that, but if it was true it would be much more useful.

    • I've had one intrusion so far. I found out the IP address the attack came from, and then got the domain name.

      The domain name ended with ".ro". Now what? I'm supposed to go to Romania and hunt somebody down?

      • by flymolo (28723)

        And even if the hacker is in the US, getting law enforcement cooperation to get logs from that hacked box will be nigh impossible.

    • Re: (Score:3, Insightful)

      by canuck57 (662392)

      How many of these scams and hack originate in the US anyway? Will their customers really have information to share?

      Lots actually. If I wanted to hack you my first step is to hack someone in a country where their police can't be bothered to look nor cooperate. Next, I launch the attack on the local USA target using the foreign system as a proxy. Some who do this even work for the same company. I have no way of qualifying this, but I am sure it is a major constituent of "foreign" hack jobs.

      More sophisticated hackers might use 2 or more proxies making it a real PITA to chase them. But sloppy ones with savvy security t

    • Sure they will "originate" in the US... And the "hackers" will act as if they knew nothing and were just a mom and some small children, who got her computer hack. But we will put them to justice, and not look at those pesky fake trojans on her computer!

  • Not sure that this is as much fun as the summary makes it out to be. I doubt that grandma will be slushing through routing tables or reading through log files to detect the source, but instead the next version of symantec's products will say "You've been pwned! Please provide ALL information to us, including data stolen, connection attempts, and your underwear sizes." and grandma will click "Send" and symantec will have more information to track down cyber-criminals.

    And everyone will live happily ever aft
    • by davidphogan74 (623610) on Friday September 04, 2009 @04:08PM (#29316371) Homepage

      The example in the article is even misleading, since it was a Facebook account that was hacked, who knows if the hackers ever touched the system of the user. He may have just used the same password too many places. I'd assume Facebook isn't using Norton Internet Security, so I'm kind of wondering what cases this will really make a difference in. Most worms/viruses even don't come from the creator's PC, but infected zombies.

      • Hey, so this is like those cure-cancer protein folding things, or like the original find-an-alien-civilization SETI project, except where it's recruiting people to become cyber vigilantes with their spare computing cycles. Awesome! I want to get my computer infected just so my employer's favorite documents can be snagged AND my daughter's school project can be shredded AND I can be implicated in a giant DDoS zombienet counter-attack scandal too. Sign me up!

    • Re: (Score:2, Funny)

      by JJJK (1029630)
      -- The data sent to Symantec will contain following information:
      -- Name: Grandma
      -- Data stolen: pictures of cats
      -- Underwear size: enormous
      -- Thank you for your support.
  • such a john wayne (Score:1, Interesting)

    by nimbius (983462)
    american "smoke em out" perspective. how about we do the following instead of chasing fourteen year olds in former east-block countries the symantec police have no jurisdiction in? 1. educate users
    2. create hardened operating systems that may never need antivirus
    3. promote open web standards and good coding practices open to scrutiny for flaws exploits and bugs.
    4. stop letting marketing drive the internet bus.
    • Re: (Score:1, Insightful)

      That's true. This is a huge mistake of Symantec's because they are tacitly admitting that people are paying them for nothing. "Give us your money and do the job that you paid us to do in exchange for an even slower computer!" Way to go Symantec!
    • by Runaway1956 (1322357) on Friday September 04, 2009 @04:03PM (#29316293) Homepage Journal

      1. Users are mostly idiots. An educated idiot is still an idiot.
      2. Despite lame excuses about "market share" that MS uses for their frequently exploited vulnerabilities, there isn't a system that CANNOT be hacked.
      3. The best standards and coding practices can probably only hope to reduce exploits by about 80 to 90 percent.
      4. Damn good idea. Next time you meet a marketer, shoot him. We don't need his genes in the pool.

      • by nurb432 (527695)

        2. Despite lame excuses about "market share" that MS uses for their frequently exploited vulnerabilities, there isn't a system that CANNOT be hacked.

        Define hacked. My ROM based computer is pretty damned immune to being hacked, in the traditional definition of the word.

        • You have a ROM based computer? You should submit a slashdot story of it, because it'd be interesting to hear how you got it working.

          Unless your talking about an Amiga or something, where viruses spread on floppies. Even if you rebooted from ROM, as soon as you put in the floppy, you have your virus again.
          • by nurb432 (527695)

            Well, i was actually thinking of my Atari ST ( with applications on cartridge ), but there are thousands of embedded machines that boot from ROM that run anything from DOS to QNX.

            You can even buy ix86 style motherboards with linux in ROM.. or just boot off a CDROM or read only flash usb.

            And depending on how you manage your PC, having infected floppies wont matter much. ( and what is a floppy? :) )

            If 'a minimal OS' isn't your thing, you could run a VM and restore it from snapshot every time you 'reboot' it.

            • by LoRdTAW (99712)

              Even a ROM system could be hacked if there were vulnerabilities. Consider an embedded Linux system that uses a flash disk that is hardware write protected. You aren't going to write to that flash disk no matter how hard you try but the kernel does need scratch space and that's going to be a ram disk. So you could temporarily infect the ram disk but as soon as the reset button is pressed your back to running normal again. But plenty of hardware devices today need some type of writable space to hold settings

        • Hacked, in the context of TFA, and in the context of my post, would mean "exploited for the purpose of gaining valuable information and/or taking advantage of exploits on other computers".

          I think it's fairly safe to say that any machine capable of browsing the internet can be taken advantage of, by one means or another. A ROM based machine may not be capable of hosting a trojan, virus or worm between boots - it is still a potential target for social networking, man in the middle, and other attacks. Boot u

          • by nurb432 (527695)

            My definition is more of a long term thing, which would be negated if i reboot every day, or before i did something 'sensitive'.

        • Re:such a john wayne (Score:4, Interesting)

          by Phurd Phlegm (241627) on Friday September 04, 2009 @04:48PM (#29316959)

          Define hacked. My ROM based computer is pretty damned immune to being hacked, in the traditional definition of the word.

          A recent paper [ucsd.edu] reports on hacking a voting machine that could only execute out of ROM. Interesting paper. I hadn't read about the technique they used before--it's quite ingenious. Turns out, being ROM-based didn't make it unhackable at all.

      • 1. Mostly agree. 2. There exist systems secure enough that it's too costly to hack into them. 3. Not true. You do get diminishing returns, but you can get arbitrarily close to any desired level of security. 4. Agree. I can see a new sport...
      • 2. Despite lame excuses about "market share" that MS uses for their frequently exploited vulnerabilities, there isn't a system that CANNOT be hacked.

        If we leave exploits till later, it is perfectly possible to run a completely sure OS by requiring all code running on the OS be signed so malware simply can't exist.

        3. The best standards and coding practices can probably only hope to reduce exploits by about 80 to 90 percent.

        The best security standards can make 99% of exploits pointless, if the browser tab only exists while rendering a page and is separated from all other pages, and the browser itself can only access files (other than those it needs) through an external file dialog, similar logic applied to all programs.

        While 2 would severely cripple the OS and 3 w

    • Re:such a john wayne (Score:4, Interesting)

      by cdrguru (88047) on Friday September 04, 2009 @04:11PM (#29316431) Homepage

      1. Impossible. There is no way to both have "computing for everyone" and have educated users. Users are going to be, well, users always.

      2. Sorry, not really possible either. If I can convince the user to run a program, grant security authorization to this program and do whatever it takes to take over their computer, the operating system is irrelevent. And yes, we are there today. Windows is plenty secure but it, as Linux does, requires an Administrator. When that is the "user" you no longer have security.

      3. The criminals aren't interested in having their code reviewed.

      4. I'm glad we have some unrealistic utopian folks here. It is always refreshing to see people that simply do not understand that all human activity since the beginning of time has revolved around "commerce" and "commerce" is, by its nature, marketing.

      Dogs are not involved in commerce. Dogs do not experience "marketing". If everyone was more dog-like we wouldn't have problems like this. We would, however, have masters.

    • >>> 1. educate users

      That is why you fail. Most people can barely multiple 12 * 12 or write a coherent letter, and you want them to learn the intricacies of an electronic machine? It. Won't. Work. You might as well ask them to fix their own cars, which is impossible since most people can't even change the oil.

    • 1. educate users

      Who is going to "educate" users? What will be taught? Where will it be taught, and to how many people? How do you deal with the differing systems that people would need to be "educated" on (remember there are still people using OSes that are 10+ years old)?

      More importantly, who will pay for it?

      It is easy to talk about "educating users", almost as easy as it is to blame the current problems on "uneducated users". But there are too many unanswered questions related to the statement.

      create hardened operating systems that may never need antivirus

      That is a great d

    • Re:such a john wayne (Score:5, Informative)

      by hairyfeet (841228) <bassbeast1968@NOsPAM.gmail.com> on Friday September 04, 2009 @05:26PM (#29317473) Journal

      Wow, you should have at least put "educate users" lower on the list, so you wouldn't fail right off the bat like that. I have been building, repairing, and selling boxes since the Win3.x days, and educating users=UBERFAIL. Why? Because of what i call "the Velma problem". You see all you have to do with Velma is send her something that says..ohh I don't know...."Happy_Puppy_Pics.scr.exe" and guess what Velma will do? If you said turn off her AV because the email tells her she has to before running her new screensaver/malware, you are right.

      I had one customer that brought in a Toshiba laptop that had over 3400! viruses. The final count IIRC was something like 3467. It took nearly two hours under power to get to the desktop, but the boss wanted to see if it "broke the record" of 2700+ he found on one machine. Turned out you could put the word "lesbians" on just about anything and he would click. Lesbian_xxx_passwords.txt.exe, Hot_lesbians.avi.exe, etc. You get the picture.

      So you see, education=UBERFAIL. It will always equal fail because the malware writers know about this thing called "social engineering" which will make otherwise normal and sane people do incredibly dumbass things, just by waving the right prize in front of them. For some it is sex, for others greed, for Velma it is cuteness. pretty much the ONLY way to remove the "Velma problem" would be to give them locked down thin clients with no rights to do much of anything, and Joe Average ain't gonna put up with that. Oh, and FLOSS guys PLEASE don't say "Linux Security" would fix it, as I tried that once with one of the porn guys, with either PCLOS or Mepis, can't recall which. He managed to complete bork the machine in less than 3 days. The poor thing wouldn't even boot anymore. How? He decided he didn't like that package manager thingie, so instead googled "Linux software" and ended up in dependency hell from a bucnh of crap he downloaded and installed from Freshmeat. Like the movie said "Stupid is as stupid does". All you can do is try to minimize the damage they can cause and clean up the mess afterwords. Sad but true.

      • Velma problem?

        I'd have expected Velma of all people to do security right. If Daphne's laptop is virus-ridden, I'd suspect Shaggy or Scooby clicking on anything that looked like a recipe or picture of food.

      • by orange47 (1519059)
        your 'Velma' is same old story: http://en.wikipedia.org/wiki/Dancing_pigs [wikipedia.org] and I don't buy it. If she doesn't know what Happy_Puppy_Pics.scr.exe is then she shouldn't be allowed to execute *any* executable program besides the one that was installed by administrator/bloke_who_installed_OS. if she wants to install something new she asks for permission from admin. after all, to use the old analogy, you shouldn't play with weapons/fire/.. if you don't know to use them properly.
        • by hairyfeet (841228)

          Thanks, as I so rarely get to use this in a sentence....WHOOOSH! That is why the majority of botnets are running on home connections and not corporate networks. You see, being the actual owner of said computer means you can't tell Velma that she will have to "ask your permission" before being allowed top do anything, because she will just fire your ass and replace you with someone who will say "Yes Mam!" and set it up the way SHE wants, which of course is she is allowed to do whatever she wants with her mac

  • by LitelySalted (1348425) on Friday September 04, 2009 @03:57PM (#29316193)

    I think, ultimately, that the internet will never be cleaned up. It is very idealistic to think there are a finite number of hackers and that their methods will not become more and more sophisticated as time goes by.

    The kind of "cleaned up" internet that these companies talk about requires STRICT regulation and STRICT monitoring. It is very apparent, from just the audience that posts on Slashdot, that regulation is the exact opposite of what people want.

    As far as the approach, the idea of a proactive anti-virus is novel, but I think the idea of recruiting novices to help hunt expert hackers is ludicrous. All it would take is a couple of reprisals from the hackers to permanently deter the said novice from going after a hacker.

    • by phantomfive (622387) on Friday September 04, 2009 @04:28PM (#29316663) Journal
      Don't know what country you live in, but around here, the only reason people tolerate hackers is because they don't really do anything. If crackers start doing reprisals (what are they going to do, reformat the hard drive? Send a hitman?), it's only going to make people angry. Despite what idiocracy fans might think, people aren't like sheep, and if you try abusing them, it only makes them mad and want to punish you back. A couple reprisals aren't going to deter novices any more than a couple arrests are going to deter crackers, or a couple executions are going to deter murderers. If punishment were a real deterrent, then the fight between Israel and Palestine would be over, because Israel has punished Palestine a lot. Instead, you get things like this [wikipedia.org], where Palestine knows they can never beat Israel, but they are willing to hurt them however they can, even if it means they will be stepped on.

      Sorry to bring politics into it, but it's a good example.
      • Re: (Score:2, Insightful)

        by LitelySalted (1348425)

        While you are arguing semantics (symantecs, lol) between hackers and crackers, I think you strongly, strongly overestimate the ability of the general populace to rise to this specific occasion.

        Technology has developed at such an accelerated rate that there are few, at the least, who really know how things work. I think I've stated this before in another article, but to most people, computers are virtually magic. The level of understanding and specific knowledge required to do so is so in-depth that really

        • by skegg (666571)

          the fight between Israel and Palestine would be over

          While you are arguing semantics (symantecs, lol)

          More like he was arguing "semetics".

      • If punishment were a real deterrent, then the fight between Israel and Palestine would be over, because Israel has punished Palestine a lot. Instead, you get things like this [wikipedia.org],

        Huh? I don't get it... are they forcing a Jewish cowboy to play Prince of Persia?

  • by Runaway1956 (1322357) on Friday September 04, 2009 @03:58PM (#29316199) Homepage Journal

    Marines aren't like cops at all. A marine knows that the best defense is a good offense. Go get 'em, before they come to get you!

  • False leads? (Score:3, Interesting)

    by dintlu (1171159) on Friday September 04, 2009 @03:58PM (#29316205)

    How difficult would it be for an enterprising "computer criminal" to leave a trail of breadcrumbs leading to someone else?

    IF this is easy to do, Symantec knows it, and this effort amounts to nothing more than a publicity stunt to sell more licenses.

    • Re: (Score:1, Funny)

      by Anonymous Coward

      Anonymous Coward, that bastard! I got his IP, it is 127.1.2.3, lets get him!

    • Leave a trail?

      I think you are overestimating what happens. I hear from people all the time how they "know" the've been hacked because things like some mysterious service host "svchost" is taking over their system in the task manager.

      It would be nice not to have a constant deluge of viruses to clean up, but this ain't gonna happen.

      The funny thing is, I am running Windows XP on one of my computers and it has no active anti-virus program on it, and I have never been infected with a virus in the three ye
      • by thethibs (882667)

        The funny thing is...

        Same here. Every few months I download a few of the latest free AVs and ASWs, run them and then wipe them. In over five years the only thing any of them has found is suspicious cookies.

  • Citizen hunters could also become cybervigilantes and harm bystanders as they pursue criminals but Symantec is betting customers won't mind being disrupted if they can help snare the bad guys.

    Hah. You think Joe and Judy are going to be concerned about the big picture when they are trying to order Suzie's birthday party invitations and can't? The big picture is nice and all, but to expect people to act reasonably is, in my experience, a recipe for disappointment.

    "I'm convinced we can clean up the Interne

  • Works for me, first target... Symantec!
  • by neonprimetime (528653) on Friday September 04, 2009 @04:04PM (#29316315) Homepage
    ... will somebody victimize me so that I can put it on my resume?
    • by NoYob (1630681)

      ... will somebody victimize me so that I can put it on my resume?

      Just look for nude pictures of celebrities - that's the only time in the last few years I actually got infected - AVG caught it. Or, visit porn sites and start clicking on links and when the "This site is a reported attack site." big red screen comes up, by pass it and start downloading. You'll get infected.

  • While it is pretty meaningless to go after spammers themselves in many cases, we could use a similar approach to cut off spammers where it really matters - at the revenue stream. If we made some strategic purchases from spamvertised sites, we could potentially figure out who is making money in the deal. And when we find them, we will find who is funding the spammers. After all, spam isn't sent out just for fun; it is sent out because someone is paying the spammers to send it out. You can use the merchant information to go after the people who are paying for spamvertising - they are often involved in illegal sales of (pirated software / counterfeit drugs / counterfeit property) anyways. If the funding dries up, the spammers will need to find other work.
    • by orange47 (1519059)
      there was an antispam system that used 'revenge' : http://en.wikipedia.org/wiki/Blue_Frog [wikipedia.org] unfortunately the project stopped for some reason.
      • there was an antispam system that used 'revenge' : http://en.wikipedia.org/wiki/Blue_Frog [wikipedia.org]

        That was a different idea altogether. Blue Frog ran under the assumptin that the spammers could be pressured directly into removing people from their lists.

        On the other hand, I acknowledge that attempting to work directly with the spammers is a lost cause. Instead you need to attack something that the spammers really care about - their profits. If you can disconnect the spammers from their revenue streams then you will remove their incentive to send out spam.

  • So they're planning to recruit every one of their customers, or just a small subset of the group "victim of Symantec"?
  • but only if i can get a trenchcoat, skateboard, really cool nickname and access to a non-baby crazy angelina jolie...
  • I'm convinced we can clean up the Internet in 10 years...

    Bwahahahahahahahahahahahahahahahahahahahaha!!!

    Oh gawd, that's rich. One of the funniest jokes I've read in a long time. Hysterical. Hopefully I'll see this guy at next year's Montreal Comedy Festival. Awesome comedian!

    How do people like that get into the position of VP of anything? A bold statement that indicates such a complete and utter lack of possibility... Unreal.

  • Advocated by a guy name "Trollope"?

    <looks at calendar>

    It's not April 1st; what's up with that?

    • by geekoid (135745)

      I presume they like English Novelists from the Victorian era.

      And no, I'm not sure how I know that

  • 10 years? No crime on the Internet? And this is coming from one of the industry leaders in Internet security? Makes me laugh. For one, as long as there are people clicking on ads, clicking on spam, and opening unknown attachments, there will be crime on the web. As long as there is money to be had, someone will try and take it. This strategy is kind of like saying if your house gets broken into, the police will give you a gun if you want. Yes, burglaries may drop, but that doesn't mean crime will go away.
  • Anyone using Symantec AV.
  • *I* mind, and will sue any responsible party or anyone that is encouraging it.

  • by cdrguru (88047) on Friday September 04, 2009 @04:21PM (#29316573) Homepage

    As long as an ISP values their customer's privacy and rights to step on other people more than they value the integrity of the Internet, we are going to have problems.

    Right now, it is not illegal, wrong, immoral or forbidden to have a computer owned by a botnet. This means that if my computer at home is infected nothing will stop it from doing whatever its little botnet commander wants it to do. And my ISP will not do anything to prevent or deter this computer from stepping on the rights of others in any way possible.

    Similarly, if your computer is intruded upon and you find an IP address that has been used to vandalize your computer, good luck. The ISP owning that ISP address will certainly not release any information about their customer without your suing the ISP or involving law enforcement. Law enforcement isn't interested until you have lots and lots of financial damages.

    All in all, this absolutely assures that "script kiddies" will get away with anything until they do something really big. Similarly, fraudsters and credit card thieves will get away with it until they do something really, really big. So what if you track them down to an IP address? It doesn't help. Nobody cares because it is just the "Internet" and law enforcement is still caught up with the idea that the only people that lose anything are nerds and geeks or people that have been foolish trying to get rich quick - so they deserve whatever they lost.

    • by wagnerrp (1305589) on Friday September 04, 2009 @05:59PM (#29317855)

      Right now, it is not illegal, wrong, immoral or forbidden to have a computer owned by a botnet. This means that if my computer at home is infected nothing will stop it from doing whatever its little botnet commander wants it to do. And my ISP will not do anything to prevent or deter this computer from stepping on the rights of others in any way possible.

      Maybe 7 years ago, my sister's computer got caught into a botnet. Someone had loaded mIRC and a bot, and her computer was off trying sequentially to find more machines to infect. We got dropped offline, and our modem was blocked from reconnecting.

      That evening, I called the ISP tech support, explained what was going on, and explained why we were disconnected. He turned our connection back on, and a couple seconds later, the scans started up again. He then proceeded to walk me though telneting into the modem, watching the NAT states to see which internal IP was causing the behavior, and then tracing that back to the machine that was infected so I could clean it.

  • Well, someone finally someone is doing something about it. I can't even remember how many hacked computers I got my hands on and I could clearly see the spam bots / irc bots processes, who controls them, how they are controlled, etc, but nobody would help me bring down the whole network. I've sent countless emails to companies who had their computer hacked, their ISPs and about 90% of them got replies from postmaster@ and the other 10% didn't get any reply. I sent logs and all the information they needed to

  • There is a big problem with their logic. If the internet has taught us anything it's that the harder you try to regulate, or get rid of something, the more likely it is to stick around. Just look up the Streisand Effect http://en.wikipedia.org/wiki/Streisand_effect [wikipedia.org]
    For every one hacker they take down, 2 will pop up in their place. Why? Because you are giving them exactly what they want. Hackers operate for 2 main reasons 1.) Because it is a challenge, and 2.) For the prestige earned when they pull off a
  • It's really sad that our law enforcement is so incompetent that we're reduced to security contractors attempting enforcement pro bono.

    Now, that's not entirely fair, our law enforcement isn't so much incompetent as nonexistent and /or apathetic in this arena. But still, this is ridiculous.

  • So, if I'm reading the summary correctly, there's this program where you can go and hunt down the bad guys, and these bad guys like to do bad things (intrusions?), and there might be bounties on the best/worst ones, and there's even a way to have bragging rights (TOP 10/killmail?), and you can collect a crazy amount of data to get this done...

    I'm confused, are we talking about the next Eve-Online expansion, or is this a different MMORPG?

  • The strategy has its risks...

    Interesting that the first thing Edwards (Business Week) thinks of are the cliché arguments for gun control.

  • yawn. there's crime everywhere, why wouldn't there be any on the internet?
  • Aside from what buggy bloatware their crappy AV is, the last time I worked on a new computer with a "trial" verison of Norton, I discovered that I couldn't completely uninstall their crapware even in safe mode. So where do I sign up? I want to report Symantec for distributing malware.

  • Strange, by "stop building burglar alarms" that would mean that Symantec is leaving the antivirus industry. I find that unlikely, which makes it a very odd thing for the senior vice-president for consumer products to say. I'm hoping he was misquoted, but can't really imagine a context where that statement works. I suppose he could be attempting to simplify for the media, but in that case he clearly doesn't understand his point well enough to correctly simplify it. If someone that high up in management c
  • Symantec doesn't want to shutdown the criminals who create demand for Symantec's products. This is all PR bull. Why this is on Slashdot's front page is beyond me.
  • They want people to think they are helping the law by using their product. The FBI does not care. Nor do the police. I have cought a few hackers red handed. Found their hangout, talked to them even. Notified the Police and the FBI. They did not care. What I was told was simply that they only have time to go after the BIG scammers. The ones that are stealing thousands and thousands of dollars. And the hackers know this. They know that if they keep it spread out and do not take large sums of money t
  • A few years ago over the space of a week I got several phone calls from irate people telling me computers I owned were attacking them. They gave me the IP address it was coming from. Hmm, that's one of our NTP servers... I asked what port they were being attacked on. "Port 123". "Hmm, I see that the only packets flowing out from this IP address to yours are in response from a packet from your network. In other words, one of your systems is requesting the time from us and you are seeing the responses t
  • This doesn't make any sense... why would Symantec want to catch the bad guys, when the very existence of those bad guys is the bread and butter of the corporation? Biting the wretched hand that feeds it?

    There's something else far more sinister going on here. Will Symantec make up the profit lost from having fewer bad guys from whom to "protect" people by milking the people themselves somehow? Of course it might be argued that's been done all along, but....

    • Symantec is just going to use this to make computer users more afraid.

      Computer users will think: "Oh man, look at all the evil schemes hackers are thinking of on the web! I'm really scared! But wait, Symantec knows all about what's going on the internet, so they can save us! Let's buy all their products so we don't have to be afraid anymore!"

      In the end this looks like nothing more than a marketing ploy. If they were really interested in going after the "bad guys" (is that even possible when so many o
  • "I'm convinced we can clean up the Internet in 10 years..."

    Disconnect from the 'Net every computer running Windows operating systems. Hell, we can have this place spic-n-span overnight!
  • Reading about his experience, Rowan Trollope has done real, solid technical work - back in the days when Symantec products (like Norton Utilities) were actually worth having. Given that, it is really hard to understand how he can say something like "clean up the Internet". The Intenet is real life, with easier anonymity. If we can't clean criminals out of ordinary cities, how in the world does he suppose we will clean them out of the Internet?
  • by Culture20 (968837) on Friday September 04, 2009 @04:56PM (#29317085)
    I am Byteman!
  • You gotta love the proactive way that they have chosen.Not that I am a fan!
  • "Hackers who find novices on their trail may trash their computers or steal their identities as punishment. Citizen hunters could also become cybervigilantes and harm bystanders as they pursue criminals." "Citizen hunters"? "Novices" on hackers trails? Really? It's a software to gather data about attacks, people. The editor's imagination went way too far.
    • by Angeliqe (1390757)
      He's thinking of America's most wanted where any citizen can happen to spot a wanted criminal. I don't see the average user being able to do anything of this sort with internet hackers or scammers. You can be better informed about the methods and possibly avoid falling into the trap, but there are already websites for that. Collecting information about attempted hacks or unknown files identified as possible threats has already been done. Comodo asks you every time you run into one if you would like to send
  • At least it's Opt-in.
  • Why would someone use a possibly infected computer with their real info?

    Why not set up a Honeypot system and create a fictional name via free web mail and then sign up for some web sites. When a scam email comes in click on the attached file or link, which will install malware on the system that Symantec can track back to the system that is accessing it. When the scammer/hacker/cracker has the fake info, you'll know that they stole it and the infected system can have a history of IP connection that leads ba

  • And I really see nothing else here. A big mounth, thing said that sound right to those without a deeper understanding of the issue. "Commercial Bullshit", to (mis-)quote Anathem.

  • "we can clean up the Internet in 10 years"
    And rid the need for Symantec. I think I'll sell my stock now.
  • "it's time to stop building burglar alarms to keep people out and go after the bad guys"
    Nah, it's time to stop building burglar alarms and lock the damn house.
    It's computer security, unlike physical security it's actually possible for it to be completely impassable. Just stop letting untrusted people run code on your machine.
    You don't need to track these criminal down, you can just completely ignore them.

  • If Symantec products were worth a shit, this might be a decent idea. But Symantec products don't work.

  • Symantec, the largest maker of antivirus software

    That, right there, just shows how very, very far users are from being educated...

I'd rather just believe that it's done by little elves running around.

Working...