| ==Phrack Inc.== |
| Volume Three, Issue Thirty-one, Phile #9 of 10 |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN Phrack World News PWN |
| PWN Issue XXXI, Part Two PWN |
| PWN Compiled by Phreak_Accident PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| {C}omputer {E}mergency {R}esponse {T}eam |
| ---------------------------------------- |
| Some call it "Internet Police" -- Others call it "just stupid." |
| CERT however is a mix. But I do give them credit -- After all, have your |
| number one goal being 'making the Internet more secure' has to be a tough task. |
| Therefore, we give them credit. |
| However, CERT is funded by DARPA, which is a government agency. And |
| anything in my book that the government runs is bad news. Yes, the government |
| pays the 6 man salary and keep their hot-line active 24 hours a day. |
| Ahh.. What do you know about CERT? "Nothing" you say? Well, the |
| following is the press release and other reprints of information about CERT. |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Richard Pethia <rdp@SEI.CMU.EDU> |
| DEAR XXXXXXXXX, |
| I have been reviewing our correspondence files and have discovered |
| that your request for information may not have been filled. I |
| apologize for the delay and hope that the information is still useful |
| to you. If, after reading the following, you have additional |
| questions or would like to subscribe to one of our information lists, |
| please send email with your question/request. |
| The Computer Emergency Response Team (CERT) was established by the Defense |
| Advanced Research Projects Agency in November of 1988 to serve members |
| of the Internet Research community. The press release below describes |
| the general role of the CERT. |
| More specifically, the CERT supports individual Internet sites by: |
| -Working with site personnel to help resolve individual computer security |
| incidents. Contact potentially affected sites to warn them of |
| possible security breaches. Work with sites to change the |
| conditions that allowed incidents to occur. |
| -Issuing advisories that alert the community to specific system |
| vulnerabilities or intrusion techniques, as well as the methods to |
| protect against them. |
| -Working with the community and system (primarily Unix) vendors to |
| reslove specific system vulnerabilities. |
| -Maintaining and operating moderated mailing lists that: (1) provide a |
| discussion forum for tools and techniques to improve the security of |
| Unix systems, and (2) provide a discussion forum and alert mechanism |
| for PC viruses, trojan horses, etc. |
| Over the past year we have developed hundreds of working relationships |
| with members of the Internet and other communities and have |
| established an extensive information collection and dissemination |
| network. Because of this network of cooperating individuals and |
| organizations, we are often able to advise the community of problems |
| allowing them to take corrective action before being affeceted by |
| those problems. |
| --------------------- |
| No. 597-88 |
| (202) 695-0192 (Info.) |
| (202) 697-3189 (Copies) |
| IMMEDIATE RELEASE December 6, 1988 (202) 697-5737 |
| (Public/Industry) |
| DARPA ESTABLISHES COMPUTER EMERGENCY RESPONSE TEAM |
| The Defense Advanced Research Projects Agency (DARPA) announced today |
| that it has established a Computer Emergency Response Team (CERT) to |
| address computer security concerns of research users of the Internet, |
| which includes ARPANET. The Coordination Center for the CERT is |
| located at the Software Engineering Institute (SEI), Carnegie Mellon |
| University, Pittsburgh, PA. |
| In providing direct service to the Internet community, the CERT will |
| focus on the special needs of the research community and serve as a |
| prototype for similar operations in other computer communities. The |
| National Computer Security Center and the National Institute of |
| Standards and Technology will have a leading role in coordinating the |
| creation of these emergency response activities. |
| The CERT is intended to respond to computer security threats such as |
| the recent self-replicating computer program ("computer virus") that |
| invaded many defense and research computers. |
| The CERT will assist the research network communities in responding to |
| emergency situations. It will have the capability to rapidly |
| establish communications with experts working to solve the problems, |
| with the affected computer users and with government authorities as |
| appropriate. Specific responses will be taken in accordance with |
| DARPA policies. |
| It will also serve as a focal point for the research community for |
| identification and repair of security vulnerabilities, informal |
| assessment of existing systems in the research community, improvement |
| to emergency response capability, and user security awareness. An |
| important element of this function is the development of a network of |
| key points of contact, including technical experts, site managers, |
| government action officers, industry contacts, executive level |
| decision-makers and investigative agencies, where appropriate. |
| Because of the many network, computer, and systems architectures and |
| their associated vulnerabilities, no single organization can be |
| expected to maintain an in-house expertise to respond on its own to |
| computer security threats, particularly those that arise in the |
| research community. As with biological viruses, the solutions must |
| come from an organized community response of experts. The role of the |
| CERT Coordination Center at the SEI is to provide the supporting |
| mechanisms and to coordinate the activities of experts in DARPA and |
| associated communities. |
| The SEI has close ties to the Department of Defense, to defense and |
| commercial industry, and to the research community. These ties place |
| the SEI in a unique position to provide coordination support to the |
| software experts in research laboratories and in industry who will be |
| responding in emergencies and to the communities of potentially |
| affected users. |
| The SEI is a federally-funded research and development center, |
| operating under DARPA sponsorship with the Air Force Systems Command |
| (Electronic Systems Division) serving as executive agent. Its goal is |
| to accelerate the transition of software technology to defense |
| systems. Computer security is primarily a software problem, and the |
| presence of CERT at the SEI will enhance the technology transfer |
| mission of the SEI in security-related areas. |
| -END- |
|
|
| QUESTIONS AND ANSWERS: DARPA ESTABLISHES CERT, 12/6/88 |
| Q: Can you provide background on earlier break-ins? |
| A: On November 2, 1988, thousands of computers connected to |
| unclassified DoD computer networks were attacked by a virus. Although |
| the virus did not damage or compromise data, it did have the effect of |
| denying service to thousands of computer users. The computer science |
| research community associated with the Defense Advanced Research |
| Projects Agency (DARPA), along with many other research laboratories |
| and military sites that use these networks, quickly responded to this |
| threat. They developed mechanisms to eliminate the infection, to |
| block the spread of the self-replicating program, and to immunize |
| against further attack by similar viruses. Software experts from the |
| University of California at Berkeley, with important contributions |
| from the Massachusetts Institute of Technology and other network |
| sites, rapidly analyzed the virus and developed immunization |
| techniques. These same software experts also provided important |
| assistance in the more recent Internet intrusion of 27-28 November. |
| As the events unfolded, DARPA established an ad hoc operation center |
| to help coordinate the activities of software experts working around |
| the clock and to provide information to appropriate government |
| officials. The operations center had three main tasks. It |
| facilitated communications among the many groups affected, it ensured |
| that government organizations were promptly informed of developments, |
| and it provided initial technical analysis in DoD. Although the |
| threat was contained quickly, a more maliciously designed virus could |
| have done serious damage. |
| The recent events serve as a warning that our necessarily increasing |
| reliance on computers and networks, while providing important new |
| capabilities, also creates new kinds of vulnerabilities. The |
| Department of Defense considers this an important national issue that |
| is of major concern in both the defense and commercial sectors. The |
| DoD is developing a technology and policy response that will help |
| reduce risk and provide an emergency reaction response. |
| Q: Who will be on the CERT? |
| A: The CERT will be a team of over 100 experts located throughout the |
| U.S. whose expertise and knowledge will be called upon when needed. |
| When not being called upon, they will continue their normal daily |
| work. As noted in the release, these experts will include: technical |
| experts, site managers, government action officers, industry contacts, |
| executive-level decision-makers and representatives from investigative |
| agencies. |
| recommendations that will be acted upon by DoD authorities. |
| Q: Is the CERT fully operational now? |
| A: We are in the very early stages of gathering people for the CERT. |
| We are first concentrating on collecting technical experts. A staff |
| is in place at SEI, but details are still being worked out. |
| Q: Will there just be one CERT? |
| A: The intent is that each major computer community may decide to |
| establish its own CERT. Each CERT will therefore serve only a |
| particular community and have a particular technical expertise. (The |
| DARPA/SEI CERT will serve, for example, the research community and |
| have expertise in Berkeley-derived UNIX systems and other systems as |
| appropriate.) The National Computer Security Center and the National |
| Institute of Standards and Technology will support the establishment |
| of the CERTs and coordinate among them. |
| Q: What are the special needs of the research community that their |
| CERT will serve? |
| A: The special challenge of the research community is improving the |
| level of computer security without inhibiting the innovation of |
| computer technology. In addition, as is often DARPA's role, their |
| CERT will serve as a prototype to explore the CERT concept so that |
| other groups can learn and establish their own. |
| Q: Does the CERT Coordination Center have a press point of contact? |
| A: No. Their function is to serve as a nerve center for the user |
| community. |
| .end |
| _______________________________________________________________________________ |
| USA Today and the devil |
| ----------------------- |
| Many controversies have been made of the article printed in USA Today |
| after Operation Sun-Devil took it's toll. |
| Phrack inc. tried to contact the author, and with no luck she wasn't |
| accepting phone calls. Please remember, this is only a USA Today article -- |
| C'mon, get real USAT. |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
|
|
| byline 'Debbie Howlett, USA Today' reads: |
| A network of computer hackers operating in 14 cities -- which bilked phone |
| companies of $50 million -- has been unplugged, police say. |
| "We're not talking about somebody who played Space Invaders too many |
| times," says Tim Holtzen, spokesman for the U.S. attorney in Phoenix. |
| The hackers -- the largest such ring discovered in the USA --broke into |
| phone company and bank computer systems to obtain account numbers and run |
| up an unknown total in debts, police say. |
| "The main thing is the life-threatening information these computer hackers |
| were trying to get into," says Richard Adams of the Secret Service. "It |
| goes beyond being monetary to totally mischievous." |
| The ring was uncovered 18 months ago, when members tried and failed to |
| infiltrate computers at Barrows Neurological Institute in Phoenix. |
| They later tried to block incoming calls to the 911 emergency service in |
| Chicago. The motivation? "The primary reason is as kind of a malicious |
| hobby." says Gary Chapman of Computer Professionals for Social |
| Responsibility. "People are interested in testing their skills against |
| security measures." But, Adams says, "I hate to minimize it by saying it |
| was just for kicks." |
| Police seized 40 computers and 23,000 disks during searches Tuesday in 14 |
| cities, officials said Wednesday. Five men, between the ages of 19 and 24, |
| have been arrested. |
| What's been uncovered so far, says Holtzen, may be "just the tip of the |
| iceberg." |
| [END OF STORY] |
| _______________________________________________________________________________ |
|
|