| ==Phrack Inc.== |
|
|
| Volume Two, Issue 22, File 12 of 12 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN P h r a c k W o r l d N e w s PWN |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN |
| PWN Issue XXII/Part 4 PWN |
| PWN PWN |
| PWN Created by Knight Lightning PWN |
| PWN PWN |
| PWN Written and Edited by PWN |
| PWN Knight Lightning and Taran King PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| Networks Of Computers At Risk From Invaders December 3, 1988 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By John Markoff (New York Times) |
|
|
| Basic security flaws similar to the ones that let intruders gain illegal entry |
| to military computer networks in recent weeks are far more common than is |
| generally believed, system designers and researchers say. |
|
|
| And there is widespread concern that computer networks used for everyday |
| activities like making airline reservations and controlling the telephone |
| system are highly vulnerable to attacks by invaders considerably less skilled |
| than the graduate student whose rogue program jammed a nationwide computer |
| network last month. |
|
|
| For example, the air traffic control system could be crippled if someone |
| deliberately put wrong instructions into the network, effectively blinding |
| controllers guiding airplanes. |
|
|
| The two recent episodes have involved military computers: One at the Mitre |
| Corporation, a company with Pentagon contracts, and the other into Arpanet, a |
| Defense Department network with links to colleges. But illegal access to |
| computer systems can compromise the privacy of millions of people. |
|
|
| In 1984, TRW Inc. acknowledged that a password providing access to 90 million |
| credit histories in its files had been stolen and posted on a computerized |
| bulletin board system. The company said the password may have been used for as |
| long as a month. |
|
|
| This year an internal memorandum at Pacific Bell disclosed that sophisticated |
| invaders had illegally gained access to telephone network switching equipment |
| to enter private company computers and monitor telephone conversations. |
|
|
| Computer security flaws have also been exploited to destroy data. In March |
| 1986 a computer burglar gained access by telephone to the office computer of |
| Rep. Ed Zschau of California, destroyed files and caused the computer to break |
| down. Four days later, staff workers for Rep. John McCain of Arizona, now a |
| senator, told the police they had discovered that someone outside their office |
| had reached into McCain's computer and destroyed hundreds of letters and |
| mailing addresses. |
|
|
| In Australia last year, a skilled saboteur attacked dozens of computers by |
| destroying an underground communication switch. The attack cut off thousands |
| of telephone lines and rendered dozens of computers, including those at the |
| country's largest banks, useless for an entire day. |
|
|
| Experts say the vulnerability of commercial computers is often compounded by |
| fundamental design flaws that are ignored until they are exposed in a glaring |
| incident. "Some vulnerabilities exist in every system," said Peter Neumann, a |
| computer scientist at SRI International in Menlo Park, California. "In the |
| past, the vendors have not really wanted to recognize this." |
|
|
| Design flaws are becoming increasingly important because of the rapidly |
| changing nature of computer communications. Most computers were once isolated |
| from one another. But in the last decade networks expanded dramatically, |
| letting computers exchange information and making virtually all large |
| commercial systems accessible from remote places. But computer designers |
| seeking to shore up security flaws face a troubling paradox: By openly |
| discussing the flaws, they potentially make vulnerabilities more known and thus |
| open to sabotage. |
|
|
| Dr. Fred Cohen, a computer scientist at the University of Cincinnati, said most |
| computer networks were dangerously vulnerable. "The basic problem is that we |
| haven't been doing networks long enough to know how to implement protection," |
| Cohen said. |
|
|
| The recent rogue program was written by Robert Tappan Morris, a 23-year-old |
| Cornell University graduate student in computer science, friends of his have |
| said. The program appears to have been designed to copy itself harmlessly from |
| computer to computer in a Department of Defense network, the Arpanet. Instead |
| a design error caused it to replicate madly out of control, ultimately jamming |
| more than 6,000 computers in this country's most serious computer virus attack. |
|
|
| For the computer industry, the Arpanet incident has revealed how security flaws |
| have generally been ignored. Cohen said most networks, in effect, made |
| computers vulnerable by placing entry passwords and other secret information |
| inside every machine. In addition, most information passing through networks |
| is not secretly coded. While such encryption would solve much of the |
| vulnerability problem, it would be costly. It would also slow communication |
| between computers and generally make networks much less flexible and |
| convenient. |
|
|
| Encryption of data is the backbone of security in computers used by military |
| and intelligence agencies. The Arpanet network, which links computers at |
| colleges, corporate research centers and military bases, is not encrypted. |
|
|
| The lack of security for such information underscored the fact that until now |
| there has been little concern about protecting data. |
|
|
| Most commercial systems give the people who run them broad power over all parts |
| of the operation. If an illicit user obtains the privileges held by a system |
| manager, all information in the system becomes accessible to tampering. |
|
|
| The federal government is pushing for a new class of military and intelligence |
| computer in which all information would be divided so that access to one area |
| did not easily grant access to others, even if security was breached. The goal |
| is to have these compartmentalized security systems in place by 1992. |
|
|
| On the other hand, one of the most powerful features of modern computers is |
| that they permit many users to share information easily; this is lost when |
| security is added. |
|
|
| In 1985 the Defense Department designed standards for secure computer systems, |
| embodied in the Orange Book, a volume that defines criteria for different |
| levels of computer security. The National Computer Security Center, a division |
| of the National Security Agency, is now charged with determining if government |
| computer systems meet these standards. |
|
|
| But academic and private computer systems are not required to meet these |
| standards, and there is no federal plan to urge them on the private sector. But |
| computer manufacturers who want to sell their machines to the government for |
| military or intelligence use must now design them to meet the Pentagon |
| standards. |
|
|
| Security weaknesses can also be introduced inadvertently by changes in the |
| complex programs that control computers, which was the way Morris's program |
| entered computers in the Arpanet. These security weaknesses can also be |
| secretly left in by programmers for their convenience. |
|
|
| One of the most difficult aspects of maintaining adequate computer security |
| comes in updating programs that might be running at thousands of places around |
| the world once flaws are found. |
|
|
| Even after corrective instructions are distributed, many computer sites often |
| do not close the loopholes, because the right administrator did not receive the |
| new instructions or realize their importance. |
| _______________________________________________________________________________ |
|
|
| Computer Virus Eradication Act of 1988 December 5, 1988 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| The following is a copy of HR-5061, a new bill being introduced in the House by |
| Wally Herger (R-CA) and Robert Carr (D-Mich.). |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
| 100th Congress 2D Session H.R. 5061 |
|
|
| To amend title 18, United States Code, to provide penalties for persons |
| interfering with the operations of computers through the use of programs |
| containing hidden commands that can cause harm, and for other purposes. |
|
|
| IN THE HOUSE OF REPRESENTATIVES July 14, 1988 |
| Mr. Herger (for himself and Mr. Carr) introduced the following bill; which was |
| referred to the Committee on the Judiciary |
|
|
| A BILL |
| To ammend title 18, United States Code, to provide penalties for persons |
| interfering with the operations of computers through the use of programs |
| containing hidden commands that can cause harm, and for other purposes. |
|
|
| - - - |
|
|
| Be it enacted by the Senate and House of Representatives of the United States |
| of America in Congress assembled, |
|
|
| SECTION 1. SHORT TITLE. |
| This Act may be cited as the "Computer Virus Eradication Act of |
| 1988". |
|
|
| SECTION 2. TITLE 18 AMENDMENT. |
| (A) IN GENERAL.- Chapter 65 (relating to malicious mischief) of |
| title 18, United States Code, is amended by adding at the end the |
| following: |
|
|
| S 1368. Disseminating computer viruses and other harmful computer |
| programs |
| (a) Whoever knowingly -- |
| (1) inserts into a program for a computer information or commands, |
| knowing or having reason to believe that such information or |
| commands will cause loss to users of a computer on which such |
| program is run or to those who rely on information processed |
| on such computer; and |
| (2) provides such a program to others in circumstances in which |
| those others do not know of the insertion or its effects; or |
| attempts to do so, shall if any such conduct affects |
| interstate or foreign commerce, be fined under this title or |
| imprisoned not more than 10 years, or both. |
| (b) Whoever suffers loss by reason of a violation of subsection (a) |
| may, in a civil action against the violator, obtain appropriate |
| relief. In a civil action under this section, the court may |
| award to the prevailing party a reasonable attorney's fee and |
| other litigation expenses. |
|
|
|
|
| (B) CLERICAL AMENDMENT.- The table of sections at the begining of |
| chapter 65 of title 18, United States Code, is amended by adding at |
| the end the following: |
| S 1368. Disseminating computer viruses and other harmful computer |
| programs. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
| NOTE: The above text was typed in by hand from a printed copy of HR5 061. |
| There is a possibility that there may be typographical errors which |
| could affect the nature of the bill. |
|
|
| For an official copy of the bill, please contact: |
|
|
| Mr. Doug Riggs |
| 1108 Longworth Bldg |
| Washington D.C. 20515 |
|
|
| Information Presented by |
| Don Alvarez of the MIT Center For Space Research |
| _______________________________________________________________________________ |
|
|
| Virus Conference In Arlington, Virginia December 5, 1988 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Entitled "Preventing and Containing Computer Virus Attacks", it takes place |
| January 30-31, in Arlington, VA. Speakers include Representative Wally Herger |
| (R-CA), a special agent from the FBI, John Landry (ADAPSO virus committee |
| chairman), Patricia Sission from NASA, as well as a collection of attorneys and |
| business folk. The conference is chaired by Dave Douglass, no information |
| provided. It supposedly costs $695. |
|
|
| The address provided is: |
|
|
| United Communications Group |
| 4550 Montgomery Avenue |
| Suite 700N |
| Bethesda, MD 20814-3382 |
|
|
|
|
| Information Provided By Gregg Tehennepe |
| _______________________________________________________________________________ |
|
|
| New York Times Reviews Novel About Computer Sabotage December 7, 1988 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| The Sunday, December 4, 1988 issue of the New York Times Book Review (their |
| Christmas Books issue) prominently reviews a new novel, 'Trapdoor,' by Bernard |
| J. O'Keefe. The premise (from the review by Newgate Callender, NYT's crime |
| fiction reviewer): |
|
|
| "A brilliant American woman of Lebanese descent has developed the computer code |
| that controls the operation of all our nuclear devices. Turned down for the |
| job she has sought, convinced male chauvinism is the reason, she is ripe to be |
| conned by a Lebanese activist. At his suggestion she inserts a virus into the |
| computer system that in a short time will render the entire American nuclear |
| arsenal useless. ... The Lebanese President ... demands that Israel withdraw |
| from the West Bank, or else he will tell the Russians that the United States |
| will lie helpless for a week or so." |
|
|
| Callender's review begins with the lead sentence, "November 2, 1988, was the |
| day computers in American went mad, thanks to the 'virus' program inserted by |
| the now-famous, fun-loving Robert T. Morris, Jr." |
|
|
| Some background on the author, also from the review: |
|
|
| "Bernard J. O'Keefe (is) chairman of the high-tech company EG&G and of an |
| international task force on nuclear terrorism ... (and is) the author |
| of a nonfiction book called 'Nuclear Hostages.' O'Keefe says, "I wrote this |
| parable to point out the complexity of modern technology and to demonstrate |
| how one error, one misjudgment, or one act of sabotage could lead to actions |
| that would annihilate civilization."" |
|
|
| Callender also says "...the execution is less brilliant than the idea. The |
| book has the usual flashbacks, the usual stereotyped characters, the usual |
| stiff dialogue." |
|
|
| Although the reviewer doesn't say so, the premise of this novel is quite |
| similar to a 1985 French thriller, published in the U.S. as 'Softwar.' That |
| novel was also based on the idea that a nation's arsenal could be completely |
| disabled from a single point of sabotage, although in 'Softwar' it was the |
| Soviet Union on the receiving end. Popular reviewers of both books apparently |
| find nothing implausible in the premise. |
| _______________________________________________________________________________ |
|
|
| Hacker Enters U.S. Lab's Computers December 10, 1988 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Thomas H. Maugh II (Los Angeles Times Service) |
|
|
| A computer hacker has entered computers at the government's Lawrence Livermore |
| Laboratory in the San Francisco Bay area eight times since last Saturday, but |
| has not caused any damage and has not been able to enter computers that contain |
| classified information, Livermore officials said Friday. [Do they ever admit |
| to anyone gaining access to classified data? -KL] |
|
|
| Nuclear weapons and the Star Wars defense system are designed at Livermore, but |
| information about those projects is kept in supercomputers that are physically |
| and electronically separate from other computers at the laboratory. |
|
|
| The hacker, whose identitiy remains unknown, entered the non-classified |
| computer system at Livermore through Internet, a nationwide computer network |
| that was shut down at the beginning of November by a computer virus. Chuck |
| Cole, Livermore's chief of security, said the two incidents apparently are |
| unrelated. |
|
|
| The hacker entered the computers through an operating system and then through a |
| conventional telephone line, he gave himself "super-user" status, providing |
| access to virtually all functions of the non-classified computer systems. |
|
|
| Officials quickly limited the super-user access, although they left some |
| computers vulnerable to entry in the hope of catching the intruder. |
|
|
| "There has been no maliciousness so far," Cole said. "He could have destroyed |
| data, but he didn't. He just looks through data files, operating records, and |
| password files...It seems to be someone doing a joy-riding thing." |
| _______________________________________________________________________________ |
|
|
| Shattering Revelations December 11, 1988 |
| ~~~~~~~~~~~~~~~~~~~~~~ |
| Taken from the RISKS Digest (Edited for this presentation) |
|
|
| [Shatter is a hacker based in England, he is currently accused of breaking into |
| computers at Massachusetts Institute of Technology. -KL] |
|
|
| (In this article, "IT" seems to refer to the computer community as a whole -KL) |
|
|
| Some of you may have already heard of me via articles in the Wall Street |
| Journal, New York Times, etc, but for those of you who do not have access to |
| copies of these newspapers I am a hacker of over 10 years activity who is based |
| near Nottingham, England [Rumored to be a false statement]. My specialities |
| are the various packet switched networks around the world such as PSS, Telepac, |
| Transpac, etc with various forays into UNIX, NOS/VE VMS, VM/SP, CMS, etc. |
|
|
| I feel that as a hacker with so much activity and expirience I am qualified to |
| make the following points on behalf of the whole hacking community. |
|
|
| Hackers are not the vandals and common criminals you all think we are in fact |
| most of the "TRUE" hackers around have a genuine respect and love for all forms |
| of computers and the data that they contain. We are as a community very |
| responsible and dedicated to the whole idea of IT, but we also have a strong |
| dislike to the abuse of IT that is perpetrated by various governments and |
| organizations either directly or indirectly. There is of course a small |
| minority of so called hackers who do cause trouble and crash systems or steal |
| money, but these people on the whole are dealt with by other hackers in a way |
| that most of you could not even think of and most never repeat their "crimes" |
| again. |
|
|
| The term "HACKER" is still one to be very proud of and I am sure that in days |
| past, anyone with a computer was called a hacker and they were very proud of |
| the fact that someone felt that you had a great technical expertise that |
| warrented the use of the term. However, all of the accusers out there now |
| suffer from the standard problem that nearly all people involved within IT have |
| and that is non-communication. You never pass on the information that you pick |
| up and teach to others within IT [American Government organizations and |
| Educational Institutes are among the greatest offenders] and this allows the |
| hacking community [who do communicate] to be at least one step ahead of the |
| system administrators when it comes to finding security problems and finding |
| the cause and solution for the problem. |
|
|
| A case in point is the recent Arpanet Worm and the FTP bug. Both these |
| problems have been known for many months if not years but, when talking to |
| various system administrators recently, not one of them had been informed about |
| them and this left their systems wide open even though they had done all they |
| could to secure them with the information they had. |
|
|
| An interesting piece of information is that hackers in England knew about |
| Morris's Worm at least 12 hours before it became public knowledge and although |
| England was not able to be infected due to the hardware in use, we were able to |
| inform the relevent people and patrol Internet to Janet gateways to look for |
| any occurance of the Worm and therefore we performed a valuble service to the |
| computing community in England -- although we did not get any thanks or |
| acknowledgement for this service. |
|
|
| Hackers should be nurtured and helped to perform what they consider a hobby. |
| Some people may do crosswords for intelectual challenge -- I study computers |
| and learn about how things interact together to function correctly (or |
| incorrectly as the case may be). The use of a group of hackers can perform a |
| valuable service and find problems that most of you could not even start to |
| think of or would even have the inclination to look for. |
|
|
| So please don't treat us like lepers and paupers. Find yourself a "TAME" |
| hacker and show him the respect he deserves. He will perform a valuble service |
| for you. Above all COMMUNICATE with each other don't keep information to |
| yourselves. |
|
|
| Bst Rgrds |
| Shatter |
| _______________________________________________________________________________ |
|
|
| IBM Sells Rolm To Siemens AG December 14, 1988 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| International Business Machines Corp. (IBM) announced on Tuesday that it was |
| selling its Rolm telephone equipment subsidiary to West Germany's Siemens AG. |
|
|
| Rolm has lost several hundred million dollars since IBM bought it in 1984 for |
| $1.5 billion. Rolm was the first, or one of the first companies to market |
| digital PBX systems. |
|
|
| As most telecom hobbyists already know, the PBX market has been very soft for |
| years. It has suffered from little or no growth and very bitter price |
| competition. |
|
|
| Siemens, a leading PBX supplier in Europe wants to bolster its sales in the |
| United States, and believes it can do so by aquiring Rolm's sales and service |
| operations. Quite obviously, it will also gain access to some of the lucrative |
| IBM customers in Europe. |
|
|
| Rolm was an early leader in digital PBX's, but they were surpassed in 1984 by |
| AT&T and Northern Telecom Ltd. of Canada. Part of the strategy behind IBM's |
| purchase of Rolm was IBM's belief that small personal computers would be linked |
| through digital PBX's. Although this has happened, most businesses seem to |
| prefer ethernet arrangements; something neither IBM or Rolm had given much |
| thought to. IBM was certain the late 1980's would see office computers |
| everywhere hooked up through PBX's. |
|
|
| IBM made a mistake, and at a recent press conference they admitted it and |
| announced that Rolm was going bye-bye, as part of the corporate restructuring |
| which has seen IBM divest itself of numerous non-computer related businesses in |
| the past several months. From its beginning until 1984, Rolm could not run |
| itself very well; now IBM has washed its corporate hands. Time will tell how |
| much luck the Europeans have with it. |
|
|
| Information Contributed by Patrick Townson |
| _______________________________________________________________________________ |
|
|
| Virus Invades The Soviet Union December 19, 1988 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| >From The San Francisco Chronicle (P. A16) |
|
|
| (UPI) - The Soviet Union announced on Decemeber 18, 1988 that that so-called |
| computer viruses have invaded systems in at least five government-run |
| institutions since August, but Soviet scientists say they have developed a way |
| to detect known viruses and prevent serious damage. |
|
|
| In August 1988, a virus infected 80 computers at the Soviet Academy of Sciences |
| before it was brought under control 18 hours later. It was traced to a group |
| of Soviet and foreign schoolchildren attending the Institute's summer computer |
| studies program, apparently resulting from the copying of game programs. |
|
|
| Sergei Abramov of the Soviet Academy of Sciences claims they have developed a |
| protective system, PC-shield, that protects Soviet computers against known |
| virus strains. It has been tested on IBM computers in the Soviet Union. "This |
| protective system has no counterpart in the world," he said (although the |
| details remain a state secret). |
| _______________________________________________________________________________ |
|
|
| Phrack World News Quicknotes Issue XXII |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 1. Rumor has it that the infamous John Draper aka Captain Crunch is currently |
| running loose on the UUCP network. Recently, it has been said that he has |
| opened up some sort of information gateway to Russia, for reasons unknown. |
| ------------------------------------------------------------------------------- |
| 2. Information Available For A Price |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| A company called Credit Checker and Nationwide SS says that anyone can; |
| o Take a lot of risk out of doing business. |
| o Check the credit of anyone, anywhere in the United States |
| o Pull Automobile Drivers License information from 49 states |
| o Trace people by their Social Security Number |
|
|
| By "Using ANY computer with a modem!" |
|
|
| To subscribe to this unique 24-hour on-line network call 1-800-255-6643. |
|
|
| Can your next door neighbor really afford that new BMW ? |
| ------------------------------------------------------------------------------- |
| 3. Reagan Signs Hearing-Aid Compatibility Bill |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| There is new legislation recently passed which requires all new phones to be |
| compatible with hearing aids by next August. The law requires a small device |
| to be included in new phones to eliminate the loud squeal that wearers of |
| hearing aids with telecoils pick up when using certain phones. Importers are |
| not exempted from the law. Cellular phones and those manufactured for export |
| are exempt. |
| _______________________________________________________________________________ |
| ========================================================================= |
|
|
|
|