| == Phrack Inc. == |
|
|
| Volume Three, Issue Thirty-five, File 5 of 13 |
|
|
| ______________________________________________________________ |
| || || |
| || Don't let THIS happen to you! || |
| || || |
| || __________ || |
| || Heh | |/No life, no future... || |
| || /Heh! | 0 H S L Q I F X || |
| || O | --|-- || |
| || --|-- | / \ || |
| || / \ | / \ || |
| || / \____|____ E N _ R _ P M E N _ || |
| || Dale ^ || |
| || Drew | || |
| || Will this be YOU?! || |
| ||______________________________________________________________|| |
|
|
|
|
| The following is a reprint of the article "Sting Operations" from the book |
| _Dedicated Computer Crime Units_ (pages 101-103) written by J. Thomas McEwen |
| for the U.S. Department of Justice and published in June 1989. |
|
|
| If you would like to get your own FREE copy of this book, or its companion |
| books: |
|
|
| - Organizing for Computer Crime Investigation and Prosecution |
| - Electronic Fund Transfer and Crime |
| - Electronic Fund Transfer Fraud |
|
|
| you can contact: |
|
|
| U.S. Department of Justice |
| Office of Justice Programs |
| National Institute of Justice |
| Washington, D.C. 20531 |
| (301)251-5500 |
| (800)851-3420 |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| S T I N G O P E R A T I O N S |
| ~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~ |
| Will *YOU* Be The Next Victim?! |
|
|
| Transcribed by Sovereign Immunity |
|
|
|
|
| ELECTRONIC BULLETIN BOARDS |
|
|
| An electronic bulletin board allows for the storage of information which can be |
| retrieved by other systems calling into the board. It is essentially a |
| database maintained by a system that is accessible by others over telephone |
| lines. Most bulletin boards have been created for specific purposes, usually |
| for the exchange of messages and information among parties with common |
| interests. For example, members of computer clubs maintain bulletin boards for |
| communicating with each other between meetings. |
|
|
| Bulletin boards are especially popular among microcomputer users. |
| Establishment of a bulletin board is facilitated by programs that can be |
| purchased or obtained from public domain software. With one of these programs, |
| a user can establish tailored menus for anyone dialing into the board. These |
| menus will usually contain options on information about the board, bulletins, |
| news summaries, personal mail, conferences, and leaving messages. |
|
|
| In addition, most bulletin boards have different levels of access to restrict |
| users from certain parts of the board. The bulletin board owner, usually |
| called the System Operator (SYSOP), personally establishes the authorized |
| access levels for each user and enters this information into the system. |
| Access is determined by having a user provide their name and password when |
| signing on to the system. A telephone line into the system is the only other |
| requirement for establishing a board on a microcomputer. |
|
|
| Access to bulletin boards generally operates along the following lines: |
|
|
| - A user dials into the bulletin board. |
| - The board responds with a message asking for the person's name and password. |
| - The board then provides a menu showing the options available to the user. |
| - The user selects an option and starts interacting with the system. |
| - During a session, a user typically may read messages, leave messages, |
| download files, upload files, or join a conference. |
| - The user eventually "quits" the session and hangs up from the board. |
|
|
| While most bulletin boards have been established for legitimate purposes, there |
| are also "pirate" or "elite" boards that contain illegal information or have |
| been established to advance an illegal activity. Security on those boards is |
| tightly controlled by the owners. With these bulletin boards, users usually |
| have to contact the owner directly to obtain a password for access to different |
| levels of the system. A degree of trust must therefore be established before |
| the owner will allow access to the board, and the owners develop "power" over |
| who can use the system. |
|
|
| Pirate boards have been found with a variety of illegal information on them |
| including the following: |
|
|
| - Stolen credit card account numbers |
| - Long distance telephone service codes |
| - Telephone numbers to mainframe computers, including passwords and account |
| numbers |
| - Procedures for making illegal drugs |
| - Procedures for making car bombs |
| - Hacking programs |
| - Tips on how to break into computer systems |
| - Schematics for electronic boxes (e.g., black box) |
|
|
| These boards obviously are a threat to communities, and their existence has |
| gained the attention of some police departments. |
|
|
|
|
| STING OPERATIONS WITH BULLETIN BOARDS |
|
|
| The experiences of the Maricopa County, Arizona, Sheriff's Department and the |
| Fremont, California, Police Department are very instructive on how local |
| departments can establish their own bulletin boards and become part of the |
| network with other boards. Members of the Maricopa County Sheriff's Department |
| were the first in the country to establish such a board. Their board resulted |
| in over 50 arrests with the usual charge being telecommunications fraud. |
|
|
| In September, 1985, the Fremont Police Department established a bulletin board |
| for the primary purpose of gathering intelligence on hackers and phreakers in |
| the area. The operation was partially funded by VISA, Inc. with additional |
| support from Wells Fargo Bank, Western Union, Sprint, MCI, and ITT. |
|
|
| After establishing their bulletin board, they advertised it on other boards as |
| the newest "phreak board" in the area. Within the first four days, over 300 |
| calls were received on the board. During the next three months, the board |
| logged over 2,500 calls from 130 regular users. Through the bulletin board, |
| they persuaded these groups that they had stolen or hacked long-distance |
| telephone service codes and credit account numbers. They were readily accepted |
| and were allowed access to pirate boards in the area. |
|
|
| The board was operated for a total of three months. During that period, over |
| 300 stolen credit card numbers and long-distance telephone service codes were |
| recovered. Passwords to many government, educational, and corporate computers |
| were also discovered on other boards. |
|
|
| The operation resulted in the apprehension of eight teenagers in the area who |
| were charged with trafficking in stolen credit card accounts, trafficking in |
| stolen long-distance telephone service codes, and possession of stolen |
| property. Within the next week, seven more teenagers in California and other |
| states were arrested on information from this operation. |
|
|
| It was established that this group had been illegally accessing between ten and |
| fifteen businesses and institutions in California. They were regularly |
| bypassing the security of these systems with stolen phone numbers and access |
| codes. One victim company estimated that it intended to spend $10,000 to |
| improve its security and data integrity procedures. Other victimized |
| businesses were proceeding along the same lines. |
|
|
|
|
| CONCLUSIONS |
|
|
| There are several reasons for conducting Sting operations of this type. One of |
| the most important is that it provides a proactive method of identifying |
| hackers and phreakers in the area. These groups are particularly hard to find |
| since they operate in closed circles with personal networks developed from |
| friendships. |
|
|
| Another byproduct of these operations is the publicity surrounding the cases. |
| Sting operations result in considerable amount of attention from the media. |
| The publicity has the effect of closing down other pirate boards in the area. |
| One of the greatest fears of these offenders in that their systems will be |
| taken, and in the Fremont operation over $12,000 of computer equipment was |
| seized. The publicity associated with these seizures seems to be the primary |
| reason for others to stop their pirate boards. |
|
|
| These operations also lead to other types of offenses. In Fremont, for |
| example, drug and alcohol cases were developed as a result of the Sting |
| operation. This has been typical of these operations. |
|
|
| The Sting operations with bulletin boards have been criticized because |
| teenagers, rather than hardened criminals, are arrested. Many hackers believe |
| that they have a right to the data in other systems and that their activities |
| are not illegal since the companies can afford the losses. On the other hand, |
| as one investigator observed, the hackers of today may be the sophisticated |
| computer criminals of tomorrow. It is therefore important to set a lesson |
| early in their careers steering them away from these offenses. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| RESPONSE FROM A MEMBER OF THE HACKER COMMUNITY: |
|
|
| Now lets take a look at this article and the ignorant author J. Thomas |
| McEwen. |
|
|
| "Pirate boards have been found with a variety of illegal |
| information on them..." |
|
|
| The author names: |
|
|
| "Telephone numbers to mainframe computers" -- There is nothing illegal in |
| having the telephone number to a mainframe computer. It is illegal to access a |
| computer without authorization. |
|
|
| "Procedures for making illegal drugs" -- It is NOT illegal to know how to |
| manufacture illegal drugs, only to actually manufacture or use them. |
|
|
| "Procedures for making car bombs" -- It is NOT illegal to know how to |
| manufacture car bombs, only to actually manufacture or use them. |
|
|
| "Hacking programs" -- Indeed most security companies, private security |
| consultants, or mainframe owners and operators use these to test their systems |
| very often. It would only be illegal to use one on a machine that you are not |
| authorized to use it on. |
|
|
| "Tips on how to break into computer systems" -- Again, it is NOT illegal to |
| know how to break into a computer... although for a change, according to a |
| section of the Computer Fraud & Abuse Act of 1986 (Federal Law), it would be |
| illegal to traffic in passwords, codes, and theoretically any instructions that |
| would be the equivalent of passwords or codes for the unauthorized entry into |
| computer systems. |
|
|
| "Schematics for electronic boxes (e.g., black box)" -- This is getting boring. |
| It is NOT illegal to know how to build these devices, only the actual |
| construction or use of them is illegal. |
|
|
|
|
| "These boards obviously are a threat to communities, and their |
| existence has gained the attention of some police departments." |
|
|
| How are they obviously a threat? |
|
|
| The author would like us to believe that if the information on how to make |
| telephone devices, explosives, or narcotics is available on bulletin boards, |
| this is enough to make them a threat to communities. |
|
|
| What he ignores is that the same information can be found in public and |
| university libraries, text books, and technical journals; |
|
|
| He ignores that the mere possession of information on how a crime MIGHT be |
| committed is NOT a crime; and finally, |
|
|
| He fails to recognize any First Amendment rights whatsoever of computer |
| bulletin boards to have all such information to begin with. |
|
|
|
|
| "It is therefore important to set a lesson early in the careers |
| steering them away from these offenses." |
|
|
| Of course an arrest for some minor computer mischief is not going to be great |
| resume material when these teenagers start applying for jobs, even though the |
| establishment has inspired within them the socially acceptable goal of |
| conforming to society's expectations. |
|
|
|
|
| CONCLUSIONS |
|
|
| The author, J. Thomas McEwen, does not know much about freedom of speech and |
| for that matter, he does not know much about the law. He does know a lot about |
| how to sensationalize very benign conduct into dangerous conspiracy. Perhaps |
| he is close friends with Geraldo Rivera. |
|
|
| Bulletin board operators and users take note of the law and your rights. Don't |
| let yourself get taken in by Sting boards or ignorant law enforcement officers |
| looking for some gratification on the job since they aren't getting it at home. |
|
|
|
|
| S o v e r e i g n I m m u n i t y |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Editor's Comments by: Dispater |
|
|
| Sting boards have been a popular topic in Phrack and Phrack World News over the |
| years. In this file, Sovereign Immunity, showed us an excerpt that discussed a |
| Sting bulletin board in Fremont, California. As it turns out, Knight Lightning |
| had some material about this way back in Phrack World News Issue 3 (which |
| actually appeared in Phrack Issue 4). The article was titled "Phoenix |
| Phortress Stings 7." There have also been many other articles in Phrack World |
| News about sting operations and bulletin boards. |
|
|
| Additionally, Phrack Issues 21-23 each carried one part of Knight Lightning's |
| "Vicious Circle" Trilogy. The first two parts of which ("Shadows Of A Future |
| Past" and "The Judas Contract") contained a lot of material about sting boards |
| and informants. |
|
|
| Although Phrack has not presented material concerning Sting boards in Maricopa |
| County, Arizona, there was discussion about a bulletin board (The Dark Side) in |
| Arizona (602) run by "The Dictator" (Dale Drew) as a sting operation revealed |
| in Computer Underground Digest 3.02 and recently we heard that he was back in |
| action under the name "Blind Faith." |
|
|
| Dispater |
| _____________________________________________________________________________?_ |
|
|