Feature
Uncovering the 'Spy' Network: Is Spyware
Watching Your Library Computers?
By Daniel Fidel Ferrer
and Mary Mead
Spyware is considered
by some people to be their worst nightmare. It is a new strain of software
and hardware that has some good applications but a high potential for misuse.
It is so devious that it could be installed and running on your computer without
your even being aware of it. At its worst, it can expose every single keystroke
and bit of data on an installed machinepotentially compromising credit
card information, social security numbers, and passwords.
In the early 1970s, programs already existed to emulate logon scripts for
computer terminals connected to mainframes, in order to capture individuals'
user IDs and passwords. This happened years before what is now known as the
World Wide Web, back when people believed that what they typed on a dumb terminal
was private and safe. Nowadays, we have a growing awareness of how little privacy
we do in fact have when we use computers at the library, at home, or at the
office. Still, too few people know about the dangers of spyware, which enables
people to access the information stored on a computer or to log keystrokes,
and then use the data for surveillance or illegal activities.
We recently tested spyware and anti-spyware software in our academic library
because we wanted to give our students hands-on experience as to what these
applications are capable of. We also purchased some hardware devices that have
the ability to log all keystrokes. (Because we feel that key-logging hardware
can be extremely dangerous, for our protection we keep ours locked in a vault.)
We found that the spyware we installed was very successful in capturing everything
we typed, including passwords. Seeing this was enough to scare usand
our students!
We hope that in the near future our librarians will be informed enough to
make patrons aware that there is a risk involved whenever they use the libraries'
public computers. Involving our library staff to help educate patrons and teach
them how to protect their computers from becoming infected has become very
important to us.
What Is Spyware and How Does It Get on a Computer?
Spyware is also known as scumware, exploitationware, and snoopware. Available
both as software and as hardware devices, it is used for the sole purpose of
tracking and recording your computer actions. This is not limited only to what
you are looking at on the Internet or to a specific Web browser; it can also
record what you do offline and even what you key into a spreadsheet or a word
processing program. The information that you or your patrons type can be secretly
logged and sent to any e-mail address on the Internet. Unfortunately, it's
unlikely that you or a patron will even know if spyware is running.
How does such a program get onto your computer in the first place? A potential
thief doesn't need physical access to your machine; a security hole such as
an unpatched Microsoft Windows operating system or server is the perfect way
for someone to gain admission.
You may inadvertently download spyware with free software by simply clicking
on the "Yes, I Agree" button without taking the time to read the license. Or,
you may receive an e-mail with a Trojan horse virus included. (In the virus
family, Trojan horses cause the most damage. They can send themselves to everyone
in your e-mail address book, erase or modify files, download another Trojan
horse that is configured to steal your passwords, and allow the virus creator
to take over your computer and remotely control it.) In some cases, your employer,
a colleague, or even the government may employ such software to monitor your
Internet activities.
Hardware: Key Loggers
Spyware can also be hardware, such as a small device that is placed between
the keyboard and the computer. This device is most often called a key logger
because it logs everything you type on the keyboard. Even looking at the device,
you would probably think it was part of the original equipment or a keyboard
extension cable. Of course, attaching a key-logging device requires physical
access to your machine. It is very easy to installit only takes about
20 seconds. There is no need to install additional software, as the devices
use either Notepad or WordPad to decode the information. For this reason, anti-spyware
applications, which look for software, cannot detect key loggers.
When an intruder has the information she desires, all she needs to do is
unhook the device and connect it to any computer to extract the data to find
out what you were doing. A device attached between the keyboard and the computer
is not the only key-logging item on the market. There are also key-logger keyboards
that look so much like ordinary keyboards that using one, you might not even
realize it has key-logging hardware built into it. Some hardware devices can
log up to 2 million keystrokes, and they range in price from $50 to $200. As
with most technology, the prices are dropping.
I Spy: Using Spyware as an Agent for Good
Spyware can be a useful tool. As a parent, you can use it to monitor your
children's actions while they're on the Internet, from what Web sites they
visit to what games they are playing to what e-mail vendors they are using.
Employers can use it to track employees' Internet and e-mail use.
In libraries, we can use spyware to track illegal activities on our computers,
such as patrons or staff using them to cyberstalk, to launch hacker attacks,
to make purchases with stolen credit cards, or to view inappropriate or indecent
materials (as defined by our individual libraries and the law). However, if
you decide to install it on library computers, make staff and patrons aware
of that fact and give the reason why. You should always let computer users
know you intend to watch their movements prior to installation.
There are also potential law-related reasons to install spyware. It can help
track copyright abusers, cyberstalkers, online harassing or hate e-mail and/or
chat users, and illegal activities, or it could even find out who is inquiring
about bomb-making information. Spyware can monitor employees suspected of resource
misuse and/or corporate spying. All of the above actions may be covered under
current laws of cybercrime (see http://www.cybercrime.gov).
License to Spy: The Legal Challenges
More often, however, spyware is used for others' gain or for surveillance
without notification, legal or otherwise.
When you download spyware with other programs, marketers may use it to monitor
what sites you visit on the Internet and to collect your personal information
in order to send you pop-up adds and banners that relate to your interests.
This practice is currently considered legal, but recent court actions have
challenged it.
In the summer of 2000, several news articles accused NetZip's Download Demon
of containing spyware.1 The articles stated that
14 million people had used the Download Demon before someone discovered that
embedded spyware was sending reports back to the company of every file downloaded
from anywhere on the Internet. (Download Demon was later licensed by RealNetworks
and renamed to RealDownload; the software was also licensed by Netscape/AOL
and called Netscape Smart Download. A class action suit against Netscape was
filed on June 30, 2000, and is currently making its way through the courts.2)
We find it extremely frightening to think that companies, particularly those
using software as ubiquitous as the Download Demon, may be watching and tracking
all of the Web sites that their users visit.
One of the first successful legal actions taken against a company with spyware
embedded in its software was by the state of Michigan against eGames, Inc.
in September 2000. Michigan Attorney General Jennifer M. Granholm alleged that
eGames had not adequately warned consumers that its software (which was available
via CD-ROM or online download) included a spyware program thatenabled a third-party
advertiser to secretly track consumers' actions while browsing on the Internet.
In January 2001, eGames agreed to remove all third-party software from future
versions and to not gather personally identifiable data without consumers'
consent.3
Another legal use of spyware that is coming under scrutiny is the FBI's monitoring
of the Internet. The FBI uses a network application called Carnivore to keep
an eye on e-mail messages going through Internet service providers, and it
uses a spyware program called Magic Lantern for key logging. The FBI is not
alone in monitoring the Internet, either; other U.S. governmental agencies
are also out there examining computer activities.
Spyware presents serious security implications for library staff computers,
as well. A member of the staff could install it onto a machine to watch the
activities of another staff member. Anyone with physical access to your computer
could use a hardware device to spy on your computer activities without your
knowing it.
To address individuals' privacy concerns regarding their use of the Internet,
two bills (H.R. 112 and S. 197) introduced in the 107th Congress would require
notification of spyware use.4 As of March 2003,
no action had been taken on either bill. According to the Federal Trade Commission,
transmittal of what you thought was private and personal information to someone
without your informed consent is considered unauthorized monitoring of computer
activities, and is illegal.
Undercover and Undetected
OK, so spyware can be used to track every activity you and your patrons do
on a computer. The really ugly news is that it is not clear with current
technology if there is a way to stop theft via spyware and to protect patrons
when they use library computers. Currently, most anti-virus software does not
even check for it.
Moreover, encrypted connections, used by Web sites that require credit card
and account information (such as amazon.com and online banks), are completely
open to spyware. This is because it can grab sensitive information prior to
its even reaching the Internet. Still, it is best to send information across
the Internet using encrypted programs whenever possible. A relative to spyware
called a sniffer program can capture unencrypted data on a network. This gives
the FBI and your local network administrators the ability to track your actions
while you are on the Internet. Some examples of encrypted applications are
secure shell telnet, secure FTP, and encrypted e-mail messages.
How Can You Protect the Computers in Your Library?
On the patron computers in our library, we block the downloading of known
spyware programs using a combination of firewall and software applications.
You can block remote installation of spyware by 1) using the Windows XP firewall,
and 2) installing a firewall from a third party such as ZoneAlarm, BlackIce,
CheckIt, etc. After you install a firewall, test it online with a program called
ShieldsUP (https://grc.com/x/ne.dll?bh0bkyd2) to check for possible security
holes and accessible computer ports.
Further, you can try to keep computers and patrons protected by 1) tightening
up software with security patches, 2) using a firewall, 3) installing antivirus
software and keeping it up-to-date with the latest signatures, and 4) warning
patrons not to input personal and confidential information on library computers.
You can check your library computers and attempt to detect spyware software
that might be running by installing anti-spyware and anti-adware applications
before opening any programs. (See the sidebar "How Do You Clean Spyware from
Your Systems?" for information about such applications.) Like antivirus software,
anti-spyware software must be updated often. One problem we currently face
is that new spyware packages become available every day, and we don't have
the time to search the Web and check out what has been released on a daily
basis. To check for hardware devices, you need to regularly look at the computer's
keyboard connection to see if there is any extra hardware attached.
In October 2002, IBM announced its Embedded Security Subsystem, security
technology consisting of hardware and software. It is a more secureand
more costlychoice than software alone. According to IBM, it
... consists of both a hardware component, the cryptographic security chip,
which supports key storage, privacy encryption and digital signatures for authentication
of identity, and a downloadable software component, Client Security Software,
which interfaces to the user and to other software applications.5
This could be a solution for protecting your information, but it is certainly
still in the early stages. It's not yet ubiquitous in computing, and it's expensive
to implement.
You may think you could expect some privacy when you use a computer in the
library, the workplace, in an Internet cafe, or even in your home, but this
is not necessarily the case. It is easier than you may think for people to
track confidential information, and for now there is no cost-effective solution.
We try to block spyware from being installed on our library computers, but
new applications that we do not know about crop up all the time.
Because spyware is becoming increasingly complex, it's important to be more
careful than ever before about what you do on the Internet, on library computers,
and on your own computers. Therefore, you need to inform library patrons about
the hazards of spyware. Ultimately, you should engage in personal and private
activities only on a computer that you ownand you should encourage and
train your patrons to do the same.
References
1. Gibson, Steve. "The Anatomy of File Download Spyware." July
14, 2000. http://grc.com/downloaders.htm.
Greene, Thomas C. "RealNetworks admits to new spyware bug." The Register,
July 25, 2000: http://www.theregister.co.uk/content/1/12167.html.
2. Granholm, Jennifer M., State of Michigan Attorney
General. Press Release Jan. 10, 2001: http://www.ag.state.mi.us/press_release/pr10203.htm.
3. Hudson, John. "Demographic Profiling: A Euphemism
for Corporate Spying." Dec. 3, 2002. http://www.acm.org/ubiquity/views/j_hudson_1.html.
4. 107th Congress, H.R. 112: "Electronic Privacy Protection
Act: To prohibit the making, sale or use of an information-collection device
without proper labeling or notice and consent." http://thomas.loc.gov.
107th Congress, S. 197: "Spyware Control and Privacy Protection Act of 2001."
http://thomas.loc.gov.
5. IBM Press Release Oct. 4, 2002:
http://www-916.ibm.com/press/prnews.nsf/jan/ EC6DA46336675C2185256C4800556D1C.
Daniel Fidel Ferrer is head of the library systems department
at Central Michigan University's Charles V. Park Library in Mount Pleasant, Mich.
In 2002, as part of a building upgrade project, he added more than 500 computers
to the library. Ferrer holds M.S.L. and M.S. degrees from Western Michigan University.
His e-mail address is Daniel.Ferrer@cmich.edu and
his Web page address is www.lib.cmich.edu/bibliographers/danielferrer. Mary
Mead is a programmer/analyst at Central Michigan University's Charles
V. Park Library. In 2002, she was part of the building upgrade project and she
continues to give ongoing support for more than 500 computers. Mead has worked
in libraries for 27 years. Her e-mail address is mead1mc@cmich.edu.
|