| ==Phrack Inc.== |
|
|
| Volume Three, Issue Thirty-five, File 3 of 13 |
|
|
| -*[ P H R A C K XXXV P R O P H I L E ]*- |
|
|
| -=>[ Presents ]<=- |
|
|
| Sincerely Yours, Chris Goggans |
| -===--===--===--===--===--===- |
| by S. Leonard Spitz |
| Associate Publisher |
| INFOSecurity Product News |
|
|
| "A provocative interview with a former member of the "Legion of Doom" suggests |
| that the ethics of hacking (or cracking) are often in the eye of the beholder." |
|
|
| Malicious hackers, even though most operate undercover, are often notorious for |
| the colorful pseudonyms they travel under. Reformed hackers, however, prefer a |
| low profile so as to shed their image of perceived criminality. Kevin Mitnick, |
| infamous for the DEC caper, is one of the foremost advocates of this strategy. |
|
|
| Now comes Chris Goggans, trailing his former "Legion of Doom" moniker, Erik |
| Bloodaxe, behind him, to try it his way. Goggans insists that where once he |
| may have bent the rules, he is now ready to give something back to society. |
| And coming across with a high degree of sincerity, he affirms his intention to |
| try. Are he and his colleagues, wearing their newly acquired information |
| security consultants hats, tilting at windmills, or does their embryonic, |
| cracker-breaking start-up, Comsec Data Security Co., stand a fighting chance? |
| We thought we would ask him. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| ISPNews: I am going to ask several legitimate questions. Please answer them |
| completely, truthfully, and honestly. |
|
|
| Chris Goggans: OK. |
|
|
|
|
| JUDGEMENT BY THE MEDIA |
|
|
| ISPNews: Would you react to Computerworld's July 29 piece, "Group Dupes |
| Security Experts," <also seen in Phrack World News issue 33, part 2 |
| as part of the article called "Legion of Doom Goes Corporate> in |
| which members of your organization were accused of masquerading as |
| potential customers to obtain information, proposals, and prices from |
| other security consultants? |
|
|
| CG: We were all amazed that something like that would ever be printed |
| because, as we understand common business practices, we weren't doing |
| anything unusual. |
|
|
| ISPNews: Computerworld reported that the Legion of Doom was "one of the |
| nation's most notorious hacker groups, according to federal law |
| enforcers." Can you respond to that? |
|
|
| CG: Notorious is a relative term. There has always been a shroud of |
| mystery covering the Legion of Doom, because it was an organization |
| whose membership was private. When you keep people in the dark about |
| the activities of something, there is always going to be the |
| perception that more is going on than there really is. |
|
|
| ISPNews: Would you say then that the characterization of being notorious is |
| unfair? |
|
|
| CG: To some degree, yes. There certainly was activity going on within |
| the group that could be considered illegal. But most of this was |
| taking place when members of the group were all between the ages |
| of 14 and 17. While I don't want to blame immaturity, that's |
| certainly a factor to be considered. |
|
|
| The Legion of Doom put out four <issues of an> on-line electronic |
| newsletter <called the Legion of Doom Technical Journals> composed |
| of different files relating to various types of computer systems |
| or netware. They explained different operating systems or |
| outlined different procedures used by networks. They were always |
| informative and explained how to use a computer. We never said |
| "This is a computer and this is how to break into it." |
|
|
| Colorful names and words used to describe groups also add to |
| notoriety. If we had been the "Legion of Flower Pickers," the |
| "Legion of Good Guys," or the "SuperFriends," there probably |
| wouldn't be this dark cloud hanging over the group. |
|
|
| ISPNews: Could you be charged with intent to provide information to others |
| which would make it easier to gain unauthorized access? |
|
|
| CG: I don't see how that could be a charge. There's the first amendment. |
| I maintain that talking about something and encouraging or forcing |
| someone to do it are completely different. |
|
|
|
|
| EARNING AN "A" IN INFOSECURITY |
|
|
| ISPNews: What attracted you to computer security? |
|
|
| CG: The same thing that would attract anybody to being a hacker. For |
| half of my life I've been in front of a computer every day. |
| Sometimes from early in the morning until the wee hours of the night. |
| And my particular focus has been on computer security. |
|
|
| ISPNews: At least the dark side of that coin. |
|
|
| CG: I wouldn't say the dark side. I'd say the flip side. If you do |
| something for 11 years, you are going to pick up a lot of knowledge. |
| And I've always wanted to find some kind of productive career that I |
| thoroughly enjoyed. So this was just an obvious progression. No one |
| wants to be a 40-year-old hacker living in fear of the Secret |
| Service. |
|
|
| ISPNews: When you first applied to enter college, did you feel that it was the |
| right place to learn about information security? |
|
|
| CG: Yes, I thought it was the right place, mainly because college is the |
| most obvious choice to pursue an education in any field. I just |
| assumed that I would be able to find formal training leading to |
| certification or a degree in this field. Yet, at the University of |
| Texas, there wasn't anything along those lines. |
|
|
| ISPNews: Did you graduate from the University of Texas? |
|
|
| CG: No, I changed majors and then moved to Houston. I had started out in |
| computer science but it was completely unrelated to any kind of |
| career I wanted to pursue. I eventually changed my major to |
| journalism. There are only two things I like to do: Work on |
| computers, and write. So, if I wasn't going to get a degree in one, |
| it was going to be in the other. I'm a semester away, and I do plan |
| on finishing. |
|
|
| ISPNews: If you were to structure a college curriculum for studies in |
| information security, would you design it to focus on technical |
| issues, ethics, business issues, or legal matters? |
|
|
| CG: I would try to focus on all of these. If you don't have a technical |
| background, you can't understand the way the operating system works, |
| and you really can't focus on some of the issues that need to be |
| addressed with information security. |
|
|
| Ethics certainly come into play ass well for obvious reasons. I |
| don't think hackers are going to go away. Even with the advent of |
| newer technology, there are always going to be people who have an |
| interest in that technology and will learn how to manipulate it. |
|
|
|
|
| ETHICS, INTELLECTUAL PROPERTY RIGHTS, AND THE LAW |
|
|
| ISPNews: What is your definition of a hacker? |
|
|
| CG: A Hacker is someone who wants to find out everything that there is to |
| know about the workings of a particular computer system, and will |
| exhaust every means within his ability to do so. |
|
|
| ISPNews: Would you also comment on the ethics of hacking? |
|
|
| CG: There is an unwritten code of ethics that most people tend to adhere |
| to. It holds that: no one would ever cause damage to anything; and |
| no one would use any information found for personal gain of any kind. |
|
|
| For the most part, the only personal gain that I have ever seen from |
| any sort of hacking activity is the moderate fame from letting others |
| know about a particular deed. And even in these cases, the total |
| audience has been limited to just a few hundred. |
|
|
| ISPNews: Are you unaware of hackers who have in fact accessed information, |
| then sold it or massaged it for money? |
|
|
| CG: No, certainly not. I am just acknowledging and defining a code of |
| ethics. We of the Legion of Doom tried to adhere to that code of |
| ethics. For example, members of the original nine who acted |
| unethically were removed from the group. |
|
|
| ISPNews: Do you believe that penetrating a computer system without either |
| making changes or removing information is ethical, or a least is not |
| unethical? |
|
|
| CG: At one time in the past I may have held that belief, but now I |
| certainly must not, because the whole idea of being involved in the |
| formation of my new company, Comsec Data Security, would show |
| otherwise. |
|
|
| ISPNews: So today, you believe that unauthorized entry is unethical. |
|
|
| CG: Exactly. As a hacker, I didn't particularly hold that. But as |
| things such as invasion of privacy, even though I never caused any |
| damage, and breach of trust became more apparent to me, I was able to |
| step back, see the picture, and realize it was wrong. |
|
|
| ISPNews: Can I conclude that you are speaking for you company and its |
| principals? |
|
|
| CG: Yes, I am speaking for all of the principals. |
|
|
| ISPNews: What are your views on the ownership of information? |
|
|
| CG: I feel that proprietary information, national-security-related |
| information, information that could be considered a trade secret, all |
| definitely have ownership, and access should be restricted. |
|
|
| In the past, I felt that information that affected me or had some |
| relevance to my life should be available to me. I felt that |
| information should be available to the people it affected, whether |
| that be phone company information, credit bureau information, banking |
| information, or computer system information in general. I am saying |
| this in the past tense. |
|
|
| In the present tense, I feel that the public is entitled only to |
| information in the public domain. Information not available legally |
| through normal channels is just going to have to be left at that. |
|
|
| ISPNews: Do you believe that software should always be in the public |
| domain.? |
|
|
| CG: No, I do not. If I wrote something as wonderful as Lotus, or any of |
| the Microsoft programs, or Windows, I would want people to pay for |
| them. |
|
|
| ISPNews: Then you do believe in private ownership of and protection for |
| software? |
|
|
| CG: Yes, definitely. |
|
|
| ISPNews: What are you views on current U.S. Computer crime laws? |
|
|
| CG: I think that the current laws are too broad. They do not make |
| distinctions between various types of computer crimes. I consider |
| breaking into a computer akin to trespassing. If someone simply |
| walks across my lawn, I might be upset because they trampled my |
| grass, but I would leave it at that. If someone drives across my |
| lawn and leaves big trenches, and then comes over and kicks down my |
| rosebush, well that's another thing. Then, if someone drives up my |
| steps, goes through my house, through my kitchen, steals all my |
| silverware, and then leaves, that's something completely different. |
| And while these physical representations of trespassing can't be |
| applied directly to an electronic format, distinctions are still |
| necessary. |
|
|
| ISPNews: And the present computer crime laws do not make these distinctions? |
|
|
| CG: I am no lawyer, but from my understanding they do not. They need to |
| be brought into focus. |
|
|
| ISPNews: If they were brought into the kind of focus you suggest, would they |
| be fair and equitable? |
|
|
| CG: Definitely, depending on the punishment that went along with them. I |
| don't think that people who own and operate computer systems would |
| view someone who has logged into their system using a guest account |
| that was deliberately left with no password to be as serious an |
| intrusion as someone who got the system administrator password and |
| then went through and deleted all the files. I don't think that |
| simple intrusion would be considered as serious as unauthorized |
| penetration along with the wholesale theft and sale to a competitor |
| of marketing information, and advertising plans, and financial |
| projections for the next quarter. |
|
|
| ISPNews: What are your views on security training for users? |
|
|
| CG: People need to be taught what the computer operating system is and |
| how it works. After that, they need to establish some sort of |
| channel by which information can be transmitted to others. Direct |
| physical contact between communicating parties, covered by official, |
| standard company procedures, is the best way to do this. |
|
|
| People need to be aware that their account, no matter the level of |
| importance, is a link in a chain that makes up the security of the |
| system. Information from one account can be used as a springboard to |
| other, more powerful accounts. All users within a network must |
| understand that their information is just as important in the |
| security chain as is that of the next person. |
|
|
| ISPNews: Given where you are coming from, why should a potential client trust |
| you? |
|
|
| CG: I know that is a natural question. Just the very nature of creating |
| a company should project an image that we are trying to come out of |
| the shadows, out of the underground. We are saying, "Look everybody, |
| we've been doing this for a long time, now we want to help. We have |
| 11 years of working information about how people compromise existing |
| security, and we can help with your particular situation." |
|
|
| ISPNews: I am sure that you understand the natural suspicion that people have. |
|
|
| CG: No, that's what I don't understand. If we at Comsec were out to |
| compromise information from an existing company's computer network, |
| we wouldn't have incorporated. We could have done that, and someone |
| else out there probably has already done so. Then the information |
| would be available to from one hacker to another. |
|
|
| ISPNews: Are you suggesting there is no system out there that you can't break |
| into? |
|
|
| CG: No, I'm not suggesting that. But I am saying the vast majority can |
| be penetrated. |
|
|
| ISPNews: Which system is easiest to crack; and which is most difficult? |
|
|
| CG: It is hard to say which system is more inherently penetrable than |
| another. From the initial log-in, it's not the operating system; |
| rather it's the system's operating environment that is the problem. |
| Users may not have addressed security measures. Certain types of |
| security holes may not have been closed. That's where a technical |
| background comes into play: to understand the way the applications |
| work; how different systems are accessed; to close holes in the |
| system which have become apparent. You have to deal with human |
| factors and technical issues. You must understand the way the |
| computer works and the way programs are run. |
|
|
| ISPNews: What is the best way to foil hackers? |
|
|
| CG: It depends on the hacker. There are different types. Some people |
| hack with modems. The casual hacker may just stumble across your |
| particular computer system, and may be foiled with something as |
| simple as good external security. He may be turned off by physical |
| security devices such as a call-back modem, some sort of code access, |
| or smart card. |
|
|
| These measures will not stop a serious hacker who is after your |
| company specifically. In this case, you have to beef up security, |
| and take additional steps to ensure the safety of your computer. And |
| you must make certain that security on the inside is as tight as on |
| the outside. |
|
|
| ISPN Editor's Note: Chris Goggans will respond, in every other issue of |
| ISPNews, to your questions on hacking computer systems. |
| His answers promise to be problem-solving, interesting, |
| and even entertaining. We invite you to write Chris c/o: |
|
|
| "Hackers' Mailbag" |
| ISPNews |
| 498 Concord Street |
| Framingham, MA 01701-2357 |
| _______________________________________________________________________________ |
|
|