Systems Beware - Hackers Want In

By Weinstein, Michael | American Banker, April 2, 1984 | Go to article overview

Systems Beware - Hackers Want In


Weinstein, Michael, American Banker


It's late at night and a young man is rummaging through the trash behind a bank branch.

He's looking for a key to unlock the bank's computer system -- to obtain valid identification codes and passwords.

If he finds the right ones, he can go home to his personal computer and dial into the bank's computer system.

If he doesn't find the right codes, he'll return the next night or spend hours in front of his computer trying to figure out the codes himself.

While many bank computer systems are designed to prevent access by these youthful intruders, or hackers, they are constantly thinking of new ways to penetrate business' computers.

And since banks, like other businesses, have significantly automated their operations in recent years, they are increasingly dependent on their computers.

Meanwhile, the number of microcomputers, or personal computers, is increasing dramatically. And these small computers are using phone lines and other communications networks to gain access to big corporate computers.

The threat to corporate information posed by this new technology has been highlighted by a few well-publicized cases of young computer enthusiasts, or hackers, gaining unauthorized access to various computer systems. Banks Security Better

Computer-security experts generally acknowledge that banks' data security is better tahn that of most companies. And many banks use a variety of techniques to protect their systems, especially the most sensitive ones involving account information and funds transfer. There has been only one known case of hackers breaching a bank's computer system, and that was a low-level inter-office message network.

But a few potential trouble spots are unresolved. Bankers should not underestimate the hacker community: It pools information and is relentless in the pursuit of its goals. Identification codes for bank computer systems have already begun appearing on the electronic bulletin boards used by hackers.

Illicit activity by insiders -- whether alone or in tandem with hackers -- is even more threatening. Computer education courses are taught in prisons, and some computer-security experts worry that hardened criminals are getting into computer crime.

The banking industry itself is encouraging the spread of microcomputers through its home banking and corporate cash management programs. Ironically, these systems that are designed to improve banking services may increase the vulnerability of customers' accounts and banks' computer systems.

There are no firm statistics on the banking industryhs losses due to computer crime. Banks are loath to publicize such incidents, but there are a few known cases.

An operations officer at Wells Fargo Bank embezzled $21.3 million from the bank beginning in 1978 by manipulating the branch settlement system. The scheme went undetected for two years. And Stanley Mark Rifkin, a computer consultant, stole $10.2 million from Security Pacific National Bank several years ago through a fraudulent wire transfer.

While these crimes were not perpetrated by hackers, they show the large amounts of money involved with computerized banking. Dial-Up Lines

For now, banks' exposure to hackers is mainly limited to dial-up phone lines. With a dial-up line, one computer, such as a hacker's microcomputer, can call another, like a bank's central computer, to support communications between the two computers.

For instance, in 1982 a former employee of the Federal Reserve Board dialed into a Fed computer using the access code of another Fed employee. Working for a brokerage firm at the time, the former Fed worker was looking for secret money supply data.

In a typical hacker operation -- accurately depicted in the movie "War Games" -- the hacker finds a phone number that is connected to a computer and repeatedly tries different passwords to get into the system. …

The rest of this article is only available to active members of Questia

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Systems Beware - Hackers Want In
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Buy instant access to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    Buy instant access to save your work.

    Already a member? Log in now.

    Oops!

    An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.