| ==Phrack Classic== |
|
|
| Volume Three, Issue 32, File #7 of 12 |
|
|
|
|
| 13th Annual National Computer Security Conference |
| October 1-4, 1990 |
| Omni Shoreham Hotel |
| Washington, D.C. |
| A "Knight Lightning" Perspective |
| by Craig M. Neidorf |
|
|
| Dr. Dorothy Denning first hinted at inviting me to take part on her panel |
| "Hackers: Who Are They?" in May 1990 when we first came into contact while |
| preparing for my trial. At the time I did not feel that it was a very good |
| idea since no one knew what would happen to me over the next few months. At |
| the conclusion of my trial I agreed to participate and surprisingly, my |
| attorney, Sheldon Zenner (of Katten, Muchin, & Zavis), accepted an invitation |
| to speak as well. |
|
|
| A few weeks later there was some dissension to the idea of having me appear at |
| the conference from some professionals in the field of computer security. They |
| felt that my presence at such a conference undermined what they stood for and |
| would be observed by computer "hackers" as a reward of sorts for my notoriety |
| in the hacker community. Fortunately Dr. Denning stuck to her personal values |
| and did not exclude me from speaking. |
|
|
| Unlike Gordon Meyer, I was unable to attend Dr. Denning's presentation |
| "Concerning Hackers Who Break Into Computer Systems" and the ethics sessions, |
| although I was informed upon my arrival of the intense interest from the |
| conference participants and the reactions to my now very well known article |
| announcing the "Phoenix Project." |
|
|
| Not wishing to miss any more class than absolutely necessary, I arrived in |
| Washington D.C. late in the day on Wednesday, October 4th. By some bizarre |
| coincidence I ended up on the same flight with Sheldon Zenner. |
|
|
| I had attended similar conventions before such as the Zeta Beta Tau National |
| Convention in Baltimore the previous year, but there was something different |
| about this one. I suppose considering what I have been through it was only |
| natural for me to be a little uneasy when surrounded by computer security |
| professionals, but oddly enough this feeling soon passed as I began to |
| encounter friends both old and new. |
|
|
| Zenner and I met up with Dorothy and Peter Denning and soon after I met Terry |
| Gross, an attorney hired by the Electronic Frontier Foundation who had helped |
| with my case in reference to the First Amendment issues. Emmanuel Goldstein, |
| editor of 2600 Magazine and probably the chief person responsible for spreading |
| the news and concern about my indictment last Spring, and Frank Drake, editor |
| of W.O.R.M. showed up. I had met Drake once before. Finally I ran into Gordon |
| Meyer. |
|
|
| So for a while we all exchanged stories about different events surrounding our |
| lives and how things had changed over the years only to be interrupted once by |
| a odd gentleman from Germany who inquired if we were members of the Chaos |
| Computer Club. At the banquet that evening, I was introduced to Peter Neumann |
| (who among many other things is the moderator of the Internet Digest known as |
| "RISKS") and Marc Rotenberg (Computer Professionals for Social Responsibility). |
|
|
| Because of the great interest in the ethics sessions and comments I had heard |
| from people who had attended, I felt a strange irony come into play. I've |
| hosted and attended numerous "hacker" conventions over the years, the most |
| notable being "SummerCon". At these conventions one of the main time consuming |
| activities has always been to play detective and attempt to solve the mystery |
| of which one of the guests or other people at the hotel were there to spy on us |
| (whether they were government agents or some other form of security personnel). |
|
|
| So where at SummerCon the youthful hackers were all racing around looking for |
| the "feds," at the NCSC I wondered if the security professionals were reacting |
| in an inverse capacity... Who Are The Hackers? Despite this attitude or maybe |
| because of it, I and the other panelists, wore our nametags proudly with a |
| feeling of excitement surrounding us. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| October 4, 1990 |
|
|
| Dorothy Denning had gathered the speakers for an early morning brunch and I |
| finally got a chance to meet Katie Hafner in person. The panelists discussed |
| some possibilities of discussion questions to start off the presentation and |
| before I knew it, it was time to meet the public. |
|
|
| As we gathered in the front of the conference room, I was dismayed to find that |
| the people in charge of the setting up the nameboards (that would sit in front |
| of each panelist) had attended the Cook school of spelling and labeled me as |
| "Neirdorf." Zenner thought this was hysterical. Luckily they were able to |
| correct the error before we began. |
|
|
| Hackers: Who Are They? |
|
|
| Dr. Denning started the presentation by briefly introducing each panelist and |
| asking them a couple of questions. |
|
|
| Katie Hafner disputed the notion that her work has caused a glorification |
| of hacking because of the severe hardships the people she interviewed had to |
| endure. I found myself sympathizing with her as I knew what it was like to |
| be in their positions. Many people commented later that her defense of Mitnick |
| seemed a little insincere as he had indeed committed some serious acts. Not |
| knowing all of the details surrounding Mitnick's case and not relying on the |
| general newsmedia as a basis for opinion I withheld any sort of judgment. |
|
|
| Emmanuel Goldstein and Frank Drake appeared to take on the mantle of being the |
| spokespersons for the hackers, although I'm unsure if they would agree with |
| this characterization. Drake's main point of view dealt with the idea that |
| young hackers seek to be able to use resources that they are otherwise excluded |
| from. He claimed to once have been a system intruder, but now that he is in |
| college and has ample computing resources available to him, he no longer sees a |
| need to "hack." |
|
|
| Goldstein on the other hand sought to justify hacking as being beneficial to |
| society because the hackers are finding security holes and alerting security to |
| fix these problems before something catastrophic occurs. |
|
|
| Gordon Meyer tried to explain the hacker mind-set and how the average hackers |
| does not see using corporate resources as having a real financial burden to |
| today's companies. Some people misunderstood his remarks to be speaking from a |
| factual position and took offense, stating that the costs are great indeed. |
| He also explained the differences between Phrack and the Computer Underground |
| Digest. Most notable is that CuD does not print tutorials about computer |
| systems. |
|
|
| Sheldon Zenner focused on the freedom of the speech and press issues. He also |
| spoke about technical details of the U.S. v. Neidorf case and the court rulings |
| that resulted from it. One major point of interest was his quite reasonable |
| belief that the courts will soon be holding companies financially liable for |
| damages that may occur because of illegal intrusion into their systems. This |
| was not to suggest that a criminal defense strategy could be that a company did |
| not do enough to keep an intruder out, but instead that the company could be |
| held civilly liable by outside parties. |
|
|
| Zenner and Denning alike discussed the nature of Phrack's articles. They found |
| that the articles appearing in Phrack contained the same types of material |
| found publicly in other computer and security magazines, but with one |
| significant difference. The tone of the articles. An article named "How to |
| Hack Unix" in Phrack usually contained very similar information to an article |
| you might see in Communications of the ACM only to be named "Securing Unix |
| Systems." But the differences were more extreme than just the titles. Some |
| articles in Phrack seemed to suggest exploiting security holes while the |
| Communications of the ACM concentrated more on fixing the problem. The |
| information in both articles would be comparable, but the audiences reading and |
| writing these articles were often very different. |
|
|
| I explained the concept and operation of Phrack and wandered into a discussion |
| about lack of privacy concerning electronic mail on the Internet from |
| government officials, system managers, and possibly even by hackers. I went on |
| to remark that the security professionals were missing the point and the |
| problem. The college and high-school students while perhaps doing some |
| exploration and causing some slight disturbances are not the place to be |
| focusing their efforts. The real danger comes from career criminals and |
| company insiders who know the systems very well from being a part of it. These |
| people are the source of computer crime in this country and are the ones who |
| need to be dealt with. Catching a teenage hacker may be an easier task, but |
| ultimately will change nothing. To this point I agreed that a hacker gaining |
| entry and exposing holes on computer systems may be a service to some degree, |
| but unlike Goldstein, I could not maintain that such activity should bring |
| prosecutorial immunity to the hacker. This is a matter of discretion for |
| security personnel and prosecutors to take into consideration. I hope they do. |
|
|
| To a large degree I was rather silent on stage. Perhaps because I was cut off |
| more than once or maybe even a little stagefright, but largely because many of |
| the questions posed by the audience were wrong on their face for me to answer. |
| I was not going to stand and defend hacking for its own sake nor was I there to |
| explain the activities of every hacker in existence. |
|
|
| So I let Goldstein and Drake handle questions geared to be answered by a system |
| intruder and I primarily only spoke out concerning the First Amendment and |
| Phrack distribution. In one instance a man upset both by Drake's comments |
| about how the hackers just want to use resources they can't get elsewhere and |
| by Goldstein's presentation of the Operation Sun-Devil raids and the attack on |
| "Zod" in New York spoke up and accused us of being viciously one sided. |
|
|
| He said that none of us (and he singled me out specifically) look to be age 14 |
| (he said he could believe I was 18) and that "our" statement that its ok for |
| hackers to gain access to systems simply because they lacked the resources |
| elsewhere meant it was ok for kids to steal money to buy drugs. |
|
|
| I responded by asking him if he was suggesting that if these "kids" were rich |
| and did not steal the money, it would be ok to purchase drugs? I was sure that |
| it was just a bad analogy so I changed the topic afterwards. He was right to a |
| certain extent, all of the hackers are not age 14 or even in highschool or |
| college, but is this really all that important of a distinction? |
|
|
| The activities of the Secret Service agents and other law enforcement officials |
| in Operation Sun-Devil and other investigations have been overwhelming and very |
| careless. True this is just their standard way of doing business and they may |
| not have even singled out the hackers as a group to focus excess zeal, but |
| recognizing that the hackers are in a worst case scenario "white-collar |
| offenders," shouldn't they alter their technique? Something that might be |
| important to make clear is that in truth my indictment and the indictments on |
| members of the Legion of Doom in Atlanta had absolutely nothing to do with |
| Operation Sun-Devil despite the general media creation. |
|
|
| Another interesting point that was brought out at the convention was that there |
| was so much activity and the Secret Service kept so busy in the state of |
| Arizona (possibly by some state official) concerning the hacker "problem" that |
| perhaps this is the reason the government did not catch on to the great Savings |
| & Loan multi-Billion dollar loss. |
|
|
| One gentleman spoke about his son being in a hospital where all his treatments |
| were being run by computer. He added that a system intruder might quite by |
| accident disrupt the system inadvertently endangering his son's life. Isn't |
| this bad? Obviously yes it is bad, but what was worse is that a critical |
| hospital computer system would be hooked up to a phoneline anyway. The main |
| reason for treatment in a hospital is so that the doctors are *there* to |
| monitor and assist patients. Could you imagine a doctor dialing in from home |
| with a modem to make his rounds? |
|
|
| There was some discussion about an editor's responsibility to inform |
| corporations if a hacker were to drop off material that he/she had breached |
| their security. I was not entirely in opposition to the idea, but the way I |
| would propose to do it was probably in the pages of a news article. This may |
| seem a little roundabout, but when you stop and consider all of the private |
| security consultants out there, they do not run around providing information to |
| corporations for free. They charge enormous fees for their services. There |
| are some organizations that do perform services for free (CERT comes to mind), |
| but that is the reason they were established and they receive funding from the |
| government which allows them to be more generous. |
|
|
| It is my belief that if a hacker were to give me some tips about security holes |
| and I in turn reported this information to a potential victim corporation, the |
| corporation would be more concerned with how and from whom I got the |
| information than with fixing the problem. |
|
|
| One of the government's expert witnesses from U.S. v. Neidorf attended this |
| session and he prodded Zenner and I with questions about the First Amendment |
| that were not made clear from the trial. Zenner did an excellent job of |
| clarifying the issues and presenting the truth where this Bellcore employee |
| sought to show us in a poor light. |
|
|
| During the commentary on the First Amendment, Hafner, Zenner, and I discussed a |
| July 22, 1988 article containing a Pacific Bell telephone document copied by a |
| hacker and sent to John Markoff that appeared on the front page of the New York |
| Times. A member of the audience said that this was ok, but the Phrack article |
| containing the E911 material was not because Phrack was only sent to hackers. |
| Zenner went on to explain that this was far from true since private security, |
| government employees, legal scholars, reporters, and telecom security personnel |
| all received Phrack without discrimination. There really is a lot that both |
| the hackers and security professionals have to learn about each other. |
|
|
| It began to get late and we were forced to end our session. I guess what |
| surprised me the most were all of the people that stayed behind to speak with |
| us. There were representatives from NASA, U.S. Sprint, Ford Aerospace, the |
| Department of Defense, a United States Army Lt. Colonel who all thanked us |
| for coming to speak. It was a truly unique experience in that a year ago I |
| would have presumed these people to be fighting against me and now it seems |
| that they are reasonable, decent people, with an interest in trying to learn |
| and help end the problems. I also met Mrs. Gail Meyer for the first time in |
| person as well. |
|
|
| I was swamped with people asking me how they could get Phrack and for the most |
| part I referred them to Gordon Meyer and CuD (and the CuD ftp). Just before we |
| went to lunch I met Donn Parker and Art Brodsky, an editor from Communications |
| Daily. So many interesting people to speak with and so little time. I spent a |
| couple hours at the National Gallery of Art with Emmanuel Goldstein, flew back |
| to St. Louis, and returned to school. |
|
|
| It was definitely an enLightening experience. |
|
|
| ++++++++++++++++++++++++++++++ |
|
|
| A very special thank you goes to Dorothy Denning, a dear friend who made it |
| possible for me to attend the conference. |
|
|
| :Craig M. Neidorf a/k/a Knight Lightning |
|
|
| C483307 @ UMCVMB.MISSOURI.EDU |
| C483307 @ UMCVMB.BITNET |
| _______________________________________________________________________________ |
|
|