Security Basics mailing list archives

RE: Spam: Re: application for an employment


From: "Craig Wright" <cwright () bdosyd com au>
Date: Thu, 23 Mar 2006 07:39:17 +1100


Hello

Kurt Stated; "Matthias' actions are just about as unethical as mine would be if I were walking by neighbour's house at 
night, saw that his front door was swinging open, and called him up or knocked on his door and woke him up to tell him 
about it."

The analogy is poor at best. Matthias was not noticing issues by accident. The use of nmap is port scanning. This would 
be an equivalent to walking around buildings and testing the doors. Further the use is to gain a privilege through 
deceptive methods (read up on the Tort of Deception for the legal aspects and definition of deception).

Matthias did not accidentally see a breach. He did not ask permission. This is a trespass. He is also expecting gain 
from the action. He is NOT altruistically going to the University with no expectation just to help them (even better 
would be sending a report anonymously). He has an expectation. He has a belief in doing the action that he can 
gain/garnish benefit - i.e. a better position in the interview (i.e. more or greater consideration).

The example is not if you notice your neighbours open door - it is one of you walking around the street looking at all 
doors seeking one that is open. This includes side doors, back doors, obscured doors and even testing the windows for 
good measure.

Not ethical.

Regards
Craig

-----Original Message-----
From: Kurt Reimer [mailto:greimer () fccc edu]
Sent: 23 March 2006 1:50
To: PCSC Information Services
Cc: Matthias Güntert; security-basics () securityfocus com
Subject: Spam: Re: application for an employment


        It's a sad thing that the overwhelming majority of respondents to this question advise Matthias against 
informing his prospective employer of the security problems he's observed in his employer's network. As a practical 
matter I guess they are correct. He's more likely to be shown the door (if not actually prosecuted) than to be admired 
for his technical skill and initiative, should he reveal his discoveries.

        But the fact that this is true does not in any way make it right, and it makes me sad and angry that these 
attitudes and policies, born of ignorance and paranoia, are now becoming codified as standards of ethics and 
professionalism.

I echo the sentiments of most
respondents in that it's not information that's relevant to your
application for employment

        It is OF COURSE RELEVANT to his application for employment as a Systems Administrator. This is part of what a 
competent and responsible System Administrator should be concerned with, and should be technically competent to do. The 
fact that these conditions exist at his prospective employer make it even more relevant.

nor is it representative of the ideal ethical standards by which
you're no doubt holding yourself.

        Matthias' actions are just about as unethical as mine would be if I were walking by by neighbor's house at 
night, saw that his front door was swinging open, and called him up or knocked on his door and woke him up to tell him 
about it. Sure, I saw his door flapping around open just the same way a thief might have seen his door flapping around 
in the breeze. It is after all the same door open the same way. What a sick world it would be if, after seeing that 
open door, I had to worry about being accused of eavesdropping or some other such garbage to the point that I might 
decide to just look down at the ground and keep on walking!!

        It even more infuriating that these are the prevailing attitudes towards Electronic Security in my country, and 
yet a majority of my countrymen are quite happy to have our government spy on our email and phone conversations. And my 
government does not even do us the courtesy of telling us about it afterwards, as Matthias common-sense impulse was to 
do.

        No, the worst thing that any sensible person could accuse Matthias of is a certain political naivete, and the 
best that you could say is that his common sense and concern for his neighbors have not yet been perverted by the 
prevailing paranoias.

        But don't call him unethical. That's an insult to ethics. Maybe it's unethical of me to spend half an hour 
writing this reply at work, but he's NOT being unethical, and I wish that he and I could afford to be so naive.

Yours,

Kurt Reimer

Matthias et al,

I don't know if this is an ethical practice for a security
administrator to undertake at all, let alone in the context of
pre-employment research. I echo the sentiments of most respondents in
that it's not information that's relevant to your application for
employment nor is it representative of the ideal ethical standards by
which you're no doubt holding yourself.
It's important to discuss your skillset including the use of security
tools, and understanding of current best practices and methodologies.
How you brought these skills to bear on an already unfortunate
situation could deleteriously impact your application here. Clearly
you have some insights that the University could benefit from and
having some prior knowledge is beneficial immediately should you
become employed by them, however, disclosing the information before
your even employed by the University could raise ethical questions
that I'm sure you're not wanting to answer.

Sincerely,

Sean Swayze
PCSC Information Services

On 20-Mar-06, at 7:45 AM, Matthias Güntert wrote:

Dear listmembers,

i am seeking for a new job as a Unix/Linux systemadministrator. There
has been an advertisement at a well known university. So I started to
prepare my self for the application. While collecting some
information about the network, using nmap, dig, etc... I was able to
read the whole namespace from the ip range (255.255.0.0)

My question is should I use some of the information I have found out
to push my application forward? What do you think how a director
would react?

--
Mit freundlichen Grüßen

               Matthias Güntert


----------------------------------------------------------------------
----- EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE The
Norwich University program offers unparalleled Infosec
managementeducation and the case study affords you unmatched
consulting experience.Tailor your education to your own professional
goals with degreecustomizations including Emergency Management,
Business Continuity Planning,Computer Emergency Response Teams, and Digital Investigations.
http://www.msia.norwich.edu/secfocus
----------------------------------------------------------------------
-----

Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within 
those States and Territories of Australia where such legislation exists.

DISCLAIMER
The information contained in this email and any attachments is confidential. If you are not the intended recipient, you 
must not use or disclose the information. If you have received this email in error, please inform us promptly by reply 
email or by telephoning +61 2 9286 5555. Please delete the email and destroy any printed copy. 

Any views expressed in this message are those of the individual sender. You may not rely on this message as advice 
unless it has been electronically signed by a Partner of BDO or it is subsequently confirmed by letter or fax signed by 
a Partner of BDO.

BDO accepts no liability for any damage caused by this email or its attachments due to viruses, interference, 
interception, corruption or unauthorised access.

---------------------------------------------------------------------------
EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The Norwich University program offers unparalleled Infosec management
education and the case study affords you unmatched consulting experience.
Tailor your education to your own professional goals with degree
customizations including Emergency Management, Business Continuity Planning,
Computer Emergency Response Teams, and Digital Investigations.

http://www.msia.norwich.edu/secfocus
---------------------------------------------------------------------------


Current thread: