Author Archive

Stephen Northcutt

Digital Government

Hackers turn to stealth mapping for cyberattacks

Hackers are beginning to exploit unique conditions of the Internet's TCP/IP communications protocol to map and analyze sites for future attack. Two such stealthy mapping techniques were discovered this month by Scott Hoye, a college intern working for the Defense Department's Shadow intrusion detection team. The Shadow group recently released government-developed detection freeware [GCN, Aug. 3, Page 1].