<html><body><div style="color:#000; background-color:#fff; font-family:HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:14pt"><div>FYI</div><div>---------------</div><div style="font-size: 14pt; font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"><div style="font-size: 12pt; font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"><div class="y_msg_container"><div id="yiv9345211262"><div dir="ltr"><div class="yiv9345211262gmail_quote">
<br><br><div dir="ltr"><div class="yiv9345211262MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;"><b><font><a href="http://www.aganoconsulting.com/businessnews/archives/228">Information Security – Hacker Motivation</a></font></b></div><div class="yiv9345211262MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;"><b><font><a href="http://www.aganoconsulting.com/businessnews/archives/228">By Dr Matunda Nyanchama, July 26, 2014</a></font></b></div><div style="width: 450px; font-family: Georgia, Times, 'Times New Roman', serif; margin-top: 5px; margin-bottom: 5px;" contenteditable="false" id="enhancrCard_0" class="link-enhancr-attachment link-enhancr-element"><table class="link-enhancr-element" cellspacing="0" cellpadding="0" border="0" style="width:450px; height:170px; position: relative; display: block;"><tbody><tr class="link-enhancr-element"><td class="link-enhancr-element" colspan="8" style="height: 1px; background-color:
#e5e5e5; font-size: 1px; border-collapse: collapse;"><div class="link-enhancr-element" style="height: 1px; background-color: #e5e5e5; font-size: 1px; line-height:0px;"> </div></td></tr><tr class="link-enhancr-element"><td rowspan="5" class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt;"> </div></td><td class="link-enhancr-element" rowspan="5" style="vertical-align: middle; width: 168px; height: 168px; background-color: #000000;border-collapse: collapse;"><div class="link-enhancr-element" style="width: 168px;" align="center"><a href="http://www.aganoconsulting.com/businessnews/archives/228" class="link-enhancr-card-urlWrapper link-enhancr-element" style="text-decoration: none !important; color: #000000 !important;"><img alt="image"
src="http://www.aganoconsulting.com/businessnews/wp-content/uploads/2014/07/TWITTER-LOGO-300x166.jpg" class="link-enhancr-thumbnail-image link-enhancr-element" width="168" height="86" style="display: block; margin: auto;"></a></div></td><td rowspan="5" class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 0pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt;"> </div></td><td rowspan="5" class="link-enhancr-element" style="width: 14px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 14px; background-color: #ffffff; font-size: 14pt;"> </div></td><td colspan="2" class="link-enhancr-element" style="height: 6px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;"><div class="link-enhancr-element" style="height: 6px; background-color: #ffffff; font-size:
6pt;"> </div></td><td rowspan="5" class="link-enhancr-element" style="width: 20px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 20px; background-color: #ffffff; font-size: 20pt;"> </div></td><td class="link-enhancr-element" rowspan="5" width="1" style="width: 1px; background-color: #e5e5e5; font-size: 1pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt;"> </div></td></tr><tr><td class="link-enhancr-element" colspan="2" style="width: 100%; vertical-align: middle; font-family: Georgia, Times, 'Times New Roman', serif;"><div class="link-enhancr-text-part link-enhancr-element" style="line-height:16.5px; background-color: #ffffff; height: 135px; width: 245px;"><div class="link-enhancr-element" style="word-wrap: break-word; word-break: break-all;"><span class="link-enhancr-element icon
icon-shrink link-enhancr-toggle"></span><span class="link-enhancr-element icon icon-close link-enhancr-delete"></span><a href="http://www.aganoconsulting.com/businessnews/archives/228" class="link-enhancr-card-urlWrapper link-enhancr-element" style="text-decoration: none !important; color: #000000 !important; line-height: 100%; font-size: 18px; display: block;"><span class="link-enhancr-element link-enhancr-card-title" style="margin: 0; font-weight: normal;margin-bottom: 3px; font-size: 18px; line-height: 21px; max-height: 43px; color: #000000; overflow: hidden !important; display: inline-block;">Business News » Information Security – Hacker Motivation</span></a><div style="font-size: 13px; line-height: 20px; color: rgb(153, 153, 153); max-height: 81px; font-family: Georgia, Times, 'Times New Roman', serif; overflow: hidden;" class="link-enhancr-card-description link-enhancr-element">Business News - Reading is
FunDamental</div></div></div></td></tr><tr><td colspan="2" class="link-enhancr-element" style="height: 4px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;"><div class="link-enhancr-element" style="height: 4px; background-color: #ffffff; font-size: 4pt;"></div></td></tr><tr><td class="link-enhancr-element" style="vertical-align: middle; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif;"><div class="link-enhancr-element" style="font-size: 0pt;"><a href="http://www.aganoconsulting.com/businessnews/archives/228" class="link-enhancr-card-url link-enhancr-element" style="color: black; text-decoration: none !important;cursor:pointer !important;" target="_blank"><span class="link-enhancr-element link-enhancr-view-on" style="display: inline-block; line-height: 11px; max-width: 145px; min-width: 85px; overflow: hidden; max-height: 13px; word-break: break-all;"><span class="link-enhancr-element link-enhancr-mobile-no-resize"
style="vertical-align:middle; font-size: 9px; line-height: 11px; color: #999999; -moz-text-size-adjust: none; -ms-text-size-adjust: none; -webkit-text-size-adjust:none; text-size-adjust:none;">View on <span style="font-weight: bold" class="link-enhancr-view-on-domain">www.aganoconsultin...</span></span></span></a></div></td><td class="link-enhancr-element" style="vertical-align: middle; width: 100px; font-family: Arial, 'Helvetica Neue', Helvetica, sans-serif;"><div class="link-enhancr-element link-enhancr-preview-wrapper" style="max-width: 100px; min-width: 80px; overflow: hidden; text-align: right; line-height: 11px; max-height: 13px; font-size: 0pt;"><span class="link-enhancr-element link-enhancr-preview-by link-enhancr-mobile-no-resize" style="vertical-align:middle; font-size: 9px; line-height: 11px; color: #999999; -moz-text-size-adjust: none; -ms-text-size-adjust: none; -webkit-text-size-adjust:none; text-size-adjust:none;">Preview by
Yahoo</span></div></td></tr><tr><td colspan="2" class="link-enhancr-element" style="height: 9px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;"><div class="link-enhancr-element" style="height: 9px; background-color: #ffffff; font-size: 9pt;"></div></td></tr><tr class="link-enhancr-element"><td class="link-enhancr-element" colspan="8" style="height: 1px; background-color: #e5e5e5; font-size: 1px; border-collapse: collapse;"><div class="link-enhancr-element" style="height: 1px; background-color: #e5e5e5; font-size: 1px; line-height:0px"> </div></td></tr></tbody></table></div>
<div class="yiv9345211262MsoNormal" style="margin-bottom: 0.0001pt; text-align: justify;"><font><a href="http://www.aganoconsulting.com/businessnews/archives/228">By Dr Matunda Nyanchama, July 26, 2014</a></font></div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin-bottom: 6pt; text-align: justify;"> </div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin-bottom: 6pt; text-align: justify;">Reports indicate that Deputy President (DP) William Ruto’s twitter
account has been compromised. This comes hardly two days after twitter accounts
of the Kenya Defense Force (KDF) and that of its spokesman, Major Emmanuel
Chirchir we compromised.</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin-bottom: 6pt; text-align: justify;">It appears that it is the same group of hackers involved in both cases
and clearly targeting the government. Indeed, using the DP’s twitter handle,
the hackers posted a series of government sites that they had hacked. While we
may not know the extent of damage inflicted, the embarrassment factor is big
enough to require immediate and urgent action on the part of government.</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin-bottom: 6pt; text-align: justify;">In social media, some people have expressed glee that these unlawful
acts and are happy that the Jubilee government is being subjected to shame. As
a “digital government”, some said, Jubilee should be better prepared to deal
with such risks, adding that the government’s rhetoric doesn’t match reality.</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin-bottom: 6pt; text-align: justify;">Whatever anyone thinks, all of us Kenyans should feel bad that such
high-level exposure is happening to key national offices in the country. This is especially so when the country faces the
monumental task in securing the country. The least we should do as citizens
(whether allied to the government or opposition) is empathize and hope that the
government would put in rapid measures to restore normalcy and trust that it
can forestall further cyber challenges of the kind we have seen.</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin-bottom: 6pt; text-align: justify;">If there is anything to learn from these incidents it is that time is
nigh for rapid implementation of information protection measures! Information
security needs to be prioritized as a matter of urgency. It is important that
we prioritize attention in this area so as to forestall similar (and perhaps
worse) happenings.</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin-bottom: 6pt; text-align: justify;">Let’s remember that these hackers are not going away. We must expect that
there will be continuous attempts at breaking into systems (be they government
or private sector) by the large mass of hackers out there. Some would be
copycat attacks while others would be fresh exploration of weaknesses of our
systems accessible over the Internet.</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin-bottom: 6pt; text-align: justify;">The hacker menace (whether internal or external to an organization) is
real and is here to stay. The best we can do is be prepared to prevent, detect
and respond to (deal with) the threat when it materializes. Indeed, the
realistic course is make it as hard as one possibly make it for hackers to
break into systems. </div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin-bottom: 6pt; text-align: justify;">There is more. There is no absolute security regardless of the amount
of resources dedicated to system protection. A well-motivated hacker with an
infinite resources (e.g. time and money) will break into a system however secure
the system is deemed.</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin-bottom: 6pt; text-align: justify;">We will be discussing protection techniques in the future. Before that,
however, we need to understand what motivates hackers and why they continue to
be a menace.</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin-bottom: 6pt; text-align: justify;">Hacking has been around as long as computers existed. The menace has
grown with the proliferation of the Internet and the Internet’s pervasive use.
As the Internet reach grows, so also does the hacker threat. This is especially
so given ease with which hackers, located in disparate locations, can
collaborate and share attack techniques.</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin-bottom: 6pt; text-align: justify;">Hackers are people who usually intrude into computer systems and
manipulate these systems for their own ends.
They are motivated by different interests, including the following: </div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;"><i>Thrill for personal satisfaction</i></div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;">These are people who hack
for the sake of hacking. They derive satisfaction from breaking into systems,
for the fun the challenge the challenge presents and are motivated by anything
other than the prize: breaking into systems. Some would then later brag about
their escapades to their underground “communities” and in the process gain
“respect” among their peers.</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;">One can imagine the
hackers in the recent Kenyan hacks bragging about how they embarrassed our
forces and the Deputy President of the nation! Quite, some “respect” it would
earn these intruders.</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;"><i>“Service to the Community”</i></div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;">These break into
systems believing that exposing flaws in the systems is good for the community.
Clearly they enjoy their thrill but also understand that once a flaw has been
exposed, the people concerned will fix it and thus leave society better off.
There was once a story of a kid who broke into a bank, created an accounted and
planted a malicious program that, on a nightly basis deducted small amounts of
money from all the accounts and deposited the amounts in an account he created.
Later, it is said, he presented the evidence to the bank management. And he
hadn’t withdrawn a cent from the large amount of money he had accumulated.</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;">Now suppose that the
hackers in the Kenyan cases intended “service to community”, they would rest
easy that the government has woken up to the reality of exposure they face.</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;"><i>Motivated by Malice</i></div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;">Despite the above, my
reading is that the people that hacked KDF and DP’s accounts were driven by
malice. Even if they many not have gained access to sensitive KDF and DP
information, the embarrassment in government ranks and across the country is
palpable. As a result, some may question KDF’s ability to protect us when they
cannot protect, as simple a thing as a twitter account. For the DP, the
question I have had posed is: how could such a BIG office (with all the
resources at its disposal) be so sloppy in the management of the DP’s
communication channels. </div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;">Malicious hackers usually
do a number of things once they enter a computer. </div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;">They may steal and
(possibly) disclose sensitive information to unauthorized parties. For example,
suppose such hackers gained access to the KDF’s battle strategy and plans. This
would be treasure in the hands of an enemy. </div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;">Now suppose that they
proceeded to modify the plans and which plans are then transmitted to the
battle field. The consequences could be dire and those in the field could be
acting on modified information. Indeed, suppose the hacker had ability to
interfere with the timely and accurate transmission of such information! They
would clearly hamper execution of battle plans to the detriment of KDF!</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;">The term <i>Information Warfare</i> is becoming common place.
This is where the theatre of war extends to cyberspace. Here hackers (working
for parties in combat) target enemy targets in order to gain advantage in the
field. A few years ago, Iranian nuclear facilities were infected by the stuxnet
virus that paralyzed its nuclear centrifuges, clearly hampering the development
of its nuclear program! </div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;">In the commercial
arena the world is becoming more and more competitive. Whoever stays ahead in
terms of research and development, and translating the information to products
and services could stay ahead economically. Now suppose the malicious hacker
gets hold of such intellectual property! </div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;">Industrial espionage
is a reality today, whether by foreign or local parties. </div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;">In a recent case,
systems of a large retail chain in North America (Target) were compromised. The
hackers gained access to the company’s customer base, including credit card
information. Such information could be used for malicious purposes including
credit card fraud. While the impact on the retail chain hasn't been quantified,
clearly it suffered substantial brand image and (perhaps) to the advantage of
its competitors.</div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin: 0in 0in 6pt 0.25in; text-align: justify;">Final words: pervasive
technology use requires clear understanding of information protection needs. These
include developing strategies, policies, deployment and operation needs to
assure systems protection. Of necessity these needs would encompass aspects of
people, processes and technology. </div>
<div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin-bottom: 6pt; text-align: justify;"> </div><div class="yiv9345211262MsoNormal" style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; margin-bottom: 6pt; text-align: justify;"><b><i>Dr Matunda Nyanchama is a Director and Managing Consultant at Agano
Consulting Inc., an ICT services firm with offices in Canada and Kenya. He can
be reached at <a rel="nofollow" ymailto="mailto:mnyanchama@aganoconsulting.com" target="_blank" href="mailto:mnyanchama@aganoconsulting.com">mnyanchama@aganoconsulting.com</a>. </i></b></div><div style="font-family: HelveticaNeue, 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"><div dir="ltr">-------------------------------------------------------------------------<br>
Matunda Nyanchama<br>
<a rel="nofollow" ymailto="mailto:matunda@gmail.com" target="_blank" href="mailto:matunda@gmail.com">matunda@gmail.com</a>; <div><a rel="nofollow" ymailto="mailto:matunda@nsemia.com" target="_blank" href="mailto:matunda@nsemia.com">matunda@nsemia.com</a> - Book Publishing - <a rel="nofollow" target="_blank" href="http://www.nsemia.com/">www.nsemia.com</a><br>
</div><div><a rel="nofollow" ymailto="mailto:matunda@aganoconsulting.com" target="_blank" href="mailto:matunda@aganoconsulting.com">matunda@aganoconsulting.com</a> - ICT Consulting - <a rel="nofollow" target="_blank" href="http://www.aganoconsulting.com/">www.aganoconsulting.com</a></div><div>-------------------------------------------------------------------------<br>
</div></div></div>
</div>
</div><br></div></div><br><br></div> </div> </div> <style>filtered {font-family:"Book Antiqua";}p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0in 0in 0.0001pt;font-size:11pt;font-family:"Book Antiqua";}p {margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman";}filtered {margin:1in 1.25in;}div.Section1 {}</style><style><!--filtered {font-family:"Book Antiqua";panose-1:2 4 6 2 5 3 5 3 3 4;}p.MsoNormal, li.MsoNormal, div.MsoNormal {margin:0in;margin-bottom:.0001pt;font-size:11.0pt;font-family:"Book Antiqua";}p {margin-right:0in;margin-left:0in;font-size:12.0pt;font-family:"Times New Roman";}filtered {margin:1.0in 1.25in 1.0in 1.25in;}div.Section1 {}--></style></div></body></html>