| ==Phrack Inc.== |
|
|
| Volume Four, Issue Forty, File 12 of 14 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Issue 40 / Part 1 of 3 PWN |
| PWN PWN |
| PWN Compiled by Datastream Cowboy PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| Scantronics BBS Seized By San Diego Police Department July 1, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Knight Lightning and The Gatsby |
| Special Thanks to Bruce Bigelo (San Diego Union-Tribune) |
|
|
| "Multiplexor and The Crypt Keeper Spill Guts" |
|
|
| A lot of stories have been circulating in the press over the past two months |
| about hordes of credit card stealing computer hackers that were disrupting |
| the economy of the United States. It all began with rumors about Multiplexor, |
| a small time hacker that was thought to have spent some time in Long Island, |
| New York and supposedly is from Indiana. The story was that Multiplexor had |
| carded a plane ticket to San Diego to see a girl or meet some friends, but |
| when he landed, he was met by the police instead. |
|
|
| Where that information or the supposed "1,000 member hacker ring" theory came |
| from, we might never know, but we know do know the facts in this case thanks |
| to police reports and warrant affidavits supplied by the court and acquired by |
| The Gatsby with help. |
|
|
| That information and more is now available. |
|
|
| For purposes of understanding the following, "SEMENICK" and "MARCOV" are both |
| the same person. You might know him better under the names of Multiplexor or |
| The Prisoner. Later in this file, you will see references to a person named |
| Kevin Marcus who is better known to some as The Crypt Keeper. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| SAN DIEGO POLICE DEPARTMENT |
| Investigators Follow-Up Report |
|
|
| CASE NUMBER: N/A |
| DATE: March 23, 1992 |
| TIME: 1300 Hours |
| SUBJECT: Damage Assessment of and Intelligence gathering on Illegal entry |
| (Hacking) Computer Systems and the Illegal use of Credit Cards. |
| SUSPECT: SEMENICK, John Edward AKA: MARCOV, Eric Edward |
| VICTIM: Zales Jewelry Store |
| LOCATION: 4465 La Jolla Village Drive, San Diego, CA |
| DETECTIVE: Dennis W. Sadler (I.D.# 2486) |
|
|
| On March 31, 1992, I received a ARJIS 4 form from Officer Smyth (I.D.# 3871) |
| regarding some papers found by a Mr. Maurice Osborne at his residence. |
|
|
| Mr. Osborne had asked an individual by the name of Eric MARCOV, who had rented |
| a room from him, to leave. After MARCOV left the house, Mr. Osborne discovered |
| some papers with what appeared to be credit card information on them. Mr. |
| Osborne called the police and reported what he found. |
|
|
| Officer Smyth collected the papers and wrote the attached report. After |
| reviewing these papers, I learned that they did in fact contain some personal |
| information on individuals which included the person's name, address, credit |
| card number, card expiration date, and social security number. It appeared |
| that the person who wrote these notes was possibly using this credit card |
| information illegally. |
|
|
| I contacted Mr. Osborne by phone on March 31st. He verified the contents of |
| the report and he stated that he feels MARCOV may still be in town. On April |
| 2nd, I was contacted by Mr. Osborne who learned that MARCOV was staying at a |
| motel in the beach area named Sleepy Time. |
|
|
| On April 2, 1992, while in the beach area, I came across the Sleepy Time Motel. |
| I contacted the motel manager, William Gainok. I asked Mr. Gainok if he had |
| a person registered there by the name of Eric MARCOV. He said that he did and |
| that Marcov was in room number 108. |
|
|
| At approximately 8:40 am, I knocked on the door to room number 108. A white |
| male answered the door. I asked him if he was Eric MARCOV. He said yes. I |
| identified myself as a San Diego Police Detective and told him that I needed |
| to talk to him about some questionable credit card activity. |
|
|
| As he opened the motel room door, I saw more papers like <those> given to me by |
| Mr. Osborne laying on the floor near the door with more credit card information |
| on them. After being invited into the motel room, I asked MARCOV if he knew |
| why I was here. He said I think so. I asked MARCOV why he thought so. He |
| said the credit cards. |
|
|
| At this point, I was only interviewing MARCOV regarding the papers found at Mr. |
| Osborne's residence. I had no active case or any evidence indicating that |
| MARCOV was involved in, or a suspect of any criminal or illegal activity. |
|
|
| I asked MARCOV if he had any I.D. on him. He said that he did not. MARCOV |
| gave me the following information; Eric Edward MARCOV, DOB 05-15-74, then |
| changed the year to 73. He said he was 18 going on 19. He did not know his |
| social security number. When asked if he had a drivers' license, he said that |
| he has never had one. MARCOV appeared to be between the age of 17 to 19 years |
| old. |
|
|
| While asking him about papers, he started talking about computers and gaining |
| information from various systems. He talked for about 10 minutes. After that, |
| I decided to call the FBI because hacking was involved in obtaining the credit |
| card information and numbers, plus the information was coming from out of |
| state. MARCOV also sounded like he knew a lot about computer hacking and was |
| involved in it himself. |
|
|
| At 8:58 am, I called the local office of the FBI and told them what I had and |
| asked if they would be interested in talking with MARCOV. I asked MARCOV prior |
| to calling the FBI, if he would be willing to talk with them about his computer |
| activities. He agreed to talk with them. |
|
|
| A short later Special Agent Keith Moses called me back at the motel. I |
| explained to him what I had and what MARCOV was willing to talk about. After |
| going over the case with Moses, he agreed to come out and talk with MARCOV. |
|
|
| Both Moses and I interviewed MARCOV regarding his hacking activities and |
| knowledge. MARCOV was extensively involved in the hacking community during |
| the last four years and had some superior knowledge about what was happening in |
| the hacker world. We later learned that he had been arrested for computer |
| crimes in early 1991 in Indianapolis. We attempted to contact the |
| investigators that worked that case, but we never received any calls back after |
| numerous attempts. |
|
|
| During the interview, I attempted to confirm MARCOV's true identity. I asked |
| him for his parents' information. He said he did not remember their home phone |
| numbers, but they had a phone. He also could not remember their home |
| addresses. I asked him for his parents' employment information. He said that |
| his father worked for a local (his home town) turbine company. |
|
|
| I called the information number for the local phone company and then called the |
| company to verify this information. However, the company's personnel office |
| could not locate any employee matching the name given to me by MARCOV. MARCOV |
| also gave me the school and year he graduated. I called the local school |
| district's administrative office and discovered they had no record of MARCOV |
| attending or graduating from their school system. |
|
|
| I confronted him with this information and he finally gave me his true |
| information. His true name was John Edward SEMENICK, DOB 05-15-75. I located |
| his father's work number and contacted him. He was very uninterested about his |
| son's whereabouts or condition. When asked if he would supply an airline or |
| bus ticket for transportation home, he said he would not. His father further |
| stated that when his son decided to come home, he'll have to find his own way. |
| SEMENICK's parents are divorced and he lives with his father. However, we |
| learned that his mother had filed a runaway report with the local sheriff's |
| office. |
|
|
| I contacted his mother and she seemed a little more concerned, but said she |
| would not provide a ticket or funds for his return. I asked both parents if |
| while John was in San Diego would they have any problems if their son assisted |
| us in our investigation. I explained to them that he was not facing any known |
| criminal charges at that point and that the information he would be giving us |
| would be for damage assessment and intelligence gathering purposes on hackers |
|
|
| Both parents stated that they had no problem with him assisting us if he was |
| not being charged. Because SEMENICK was a juvenile and a runaway report was |
| filed on him, we contacted the U.S. Attorney's office, the District Attorney's |
| Juvenile Division, and the Juvenile Hall Probation Intake Officer for advice. |
|
|
| They advised us that their was no problem with him giving us information. |
| SEMENICK was booked into Juvenile hall as a runaway and then released to a |
| halfway home for the evening. The intake officer explained to us that because |
| his parents would not send for him, they would only keep him for one evening |
| and then he would be let go on his own again the next day. |
|
|
| After SEMENICK went through the runaway process and was being released, we |
| picked him back up. The FBI agreed and furnished the fund's to put SEMENICK up |
| in a hotel, give him living expenses, and then provide transportation for him |
| home. SEMENICK was put up in a suite at the Mission Valley Marriott. He was |
| allowed to do what he wanted while staying at the hotel and to see his friends |
| at any time. |
|
|
| During SEMENICK's stay at the Marriott, either myself or Agent Moses stayed in |
| the hotel room next to SEMENICK's. During the three day stay at the hotel, |
| SEMENICK was able to provide us with some very useful information and |
| intelligence. It was not enough to make any arrest, but we obtained some very |
| valuable information. We were not able to independently verify the information |
| by another source. |
|
|
| During the period of April 3rd to April 5th, 1992, SEMENICK contacted numerous |
| persons by phone who were involved in computer hacking. SEMENICK willingly and |
| voluntarily signed an FBI consent form giving us permission to record his phone |
| calls during the course of our investigation. There were numerous tape |
| recorded phone conversations involving at least 4 separate individuals. |
|
|
| During this same period of time, information in data format was also downloaded |
| from another individual's computer located on the East Coast to the computer |
| we had set up. The information we received during the download was current |
| credit records just obtained from CBI credit reporting company by this person, |
| a CBI manual written in part by "Kludge" a San Diego hacker, and numerous |
| other files/documents involving illegal activity such as "carding." "Carding" |
| is a term used by the hacker community regarding the illegal or fraudulent use |
| of credit cards or credit card numbers by hackers nationwide. |
|
|
| SEMENICK stated that he had been a member of a local BBS called Scantronics |
| when he was an active hacker. He stated that the board is run by a guy named |
| "KLUDGE" and contains hundreds of files and documents. He said that most of |
| these files and documents contained on "KLUDGE's" computer are "how to" |
| manuals. This means that they instruct the person who obtains them through |
| Scantronics BBS on how to do various things both legal and illegal. Some of |
| the illegal activities that are covered on this BBS is carding, phone hacking, |
| ATM fraud, and credit bureau information. |
|
|
| We obtained three documents written by or put out by either "KLUDGE" or |
| Scantronics BBS. |
|
|
| THIS INVESTIGATION IS ONGOING AT THIS TIME AND FURTHER INFORMATION AND EVIDENCE |
| WILL BE ADDED. |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| SAN DIEGO POLICE DEPARTMENT |
| Investigators Follow-Up Report |
|
|
| CASE NUMBER: N/A |
| DATE: April 30, 1992 |
| TIME: 0700 Hours |
| SUBJECT: Computer Hacking |
| SUSPECT: N/A |
| VICTIM: N/A |
| LOCATION: N/A |
| DETECTIVE: Dennis W. Sadler (I.D.# 2486) |
|
|
| On April 16, 1992, I was contacted by Kevin Marcus. Marcus learned that we |
| were investigating individuals who were illegally logging (hacking) into |
| various computer systems nationwide. Marcus runs a local computer bulletin |
| board system (BBS) called The Programmer's Paradise. Marcus was concerned |
| about the illegal activities had had seen on various local BBSs and contacted |
| me. |
|
|
| Marcus also said that he had received computer messages from a person who goes |
| by the name (handle) of Knight Lightning in New York who asked him if he heard |
| anything about our investigation. Knight Lightning told Marcus that on April |
| 3rd a reporter from San Diego by the name of Bigelo had contacted and talked to |
| him about our ongoing investigation. |
|
|
| -- -- -- -- -- -- -- -- |
| Enclosure 1: |
|
|
| Date: Fri, 10 Apr 1992 18:14:11 -500 |
| To: knight@eff.org |
| From: Craig Neidorf <knight@eff.org> |
| Subject: Runaway Teen Hacker Picked Up? |
|
|
| I was just contacted by a reporter in San Diego about a hacker case. |
|
|
| Apparently there is a teenage hacker from Indiana who ran away from home to |
| California to see some girl there. The local police and the FBI supposedly |
| picked him up on April 3rd and he remains in their custody uncharged while he |
| is telling them all sorts of information on hacker rings across the nation. |
|
|
| Does anyone have any clues as to who this kid is or what's going on? |
|
|
| :Knight Lightning |
|
|
| -- -- -- -- -- -- -- -- |
|
|
| Enclosure 2: |
|
|
| Date: Thu, 16 Apr 1992 22:25:17 -0400 |
| From: Craig Neidorf <knight@eff.org> |
| To: tck@netlink.cts.com |
| Subject: Re: Hi. |
|
|
| Bruce Bigelo, Union Tribune. Left his number at the office. Nothing going on, |
| but I understand that you called him. |
|
|
| Craig |
|
|
| -- -- -- -- -- -- -- -- |
|
|
| Marcus offered to assist us. I asked if he knew of a BBS called Scantronics. |
| He said that he did and that he had been a member of that BBS and view the |
| files on that board in the past to see what the board carried. Marcus is a |
| computer science major at a local college and is doing research in the anti- |
| virus field. Marcus stated that the board carried a lot of technical data, but |
| had nothing regarding his subject. Marcus also belongs to other local and out- |
| of-state BBSs where he talks with other individuals with his same interest. |
|
|
| Marcus stated that he was last on Scantronics BBS about a month ago and he had |
| seen numerous computer files that involved CBI and carding. Carding is a term |
| used by hackers who are involved in the illegal or fraudulent use of credit |
| cards and their numbers. These credit card numbers are obtained from credit |
| reporting companies such as CBI and TRW, by illegally accessing (hacking) their |
| way into those company computers and reading or copying private individuals |
| credit reports and information. |
|
|
| Most copies of credit reports from these companies will show a person's name, |
| current and previous addresses, social security number, employer, salary, and |
| all current credit history including all credit cards and their account |
| numbers. They <the hackers> then use these credit card numbers to obtain |
| goods. |
|
|
| If one of the hackers used an account number he found on a credit report that |
| he illegally pulled from the credit reporting company, the victim would most |
| likely not find out that their card had been illegally used until the next |
| billing cycle which could be as much as 45 days after the illegal transaction |
| took place. According to the credit card industry, this is one of the most |
| risk free and safest way to commit credit card fraud. |
|
|
| Marcus said that the person's name who ran this BBS was Jeremy. He did not |
| know his last name, but the handle he is known by is "KLUDGE." I asked if he |
| knew the phone number to this BBS and he gave me 423-4852. The BBS phone |
| number, the operator's first name, and <the operator's> handle matched the |
| information we had learned earlier. |
|
|
| Marcus also gave me two disks <that> contained some files which had been |
| downloaded (left on his BBS) by other persons on his system. He regularly |
| checks his board and removes or deletes files regarding questionable or illegal |
| activity such as carding. |
|
|
| I viewed both of these disks and they contained some very interesting files. |
| These files included various topics <such as> an auto theft manual, CBI manual, |
| TRW manual, American Express card info, and many other files which if |
| downloaded or copied by another person, that person could easily gain illegal |
| access to various credit reporting companies and commit various other illegal |
| types of activity. |
|
|
| I told Marcus if he came across any further information regarding this type of |
| activity or further information about the BBS called Scantronics to please |
| contact me. |
|
|
| On April 17, 1992, I met Marcus and he said that he had logged onto Scantronics |
| last night by using an access number a friend gave him. This same friend had |
| let him use his access number to gain access to this BBS on many prior |
| occasions. He did this on his own, without any direction whatsoever from me or |
| any other law enforcement official. |
|
|
| Marcus handed me a 5 1/4" computer disk and said that it contained some file |
| listings and a list of all validated users. Marcus also stated that the disk |
| contained a copy of the messages that were sent to him through his BBS by the |
| person in New York regarding our investigation [those messages displayed above |
| from Knight Lightning]. |
|
|
| He asked me if I wanted him to log on and see for myself what was on "KLUDGE's" |
| BBS. I told him that I would have to consult with the D.A.'s office first. |
| However, I was unable to get a hold of our D.A. liaison. I told <Marcus> that |
| I'd get back with him later. |
|
|
| After talking to D.A. Mike Carlton, I advised Marcus not to go into Scantronics |
| BBS unless it was for his own information. However he said that if he came |
| across any further information during his normal course of running his own BBS, |
| he would notify me. |
|
|
| -- -- -- -- -- -- -- -- |
|
|
| [The police report also contained 60 pages of printouts of postings and text |
| files found on Scantronics BBS. It is also made very clear that Kevin Marcus |
| (aka The Crypt Keeper) accessed Scantronics BBS by using the password and |
| account number of The Gatsby. Files include: |
|
|
| - "Credit Bureau Information" which sounds harmless enough to begin with and |
| turns out is actually a reprint of an article from the September 27, 1992 |
| issue of Business Week Magazine |
|
|
| - "Advanced Carding" by The Disk Jockey, which dates back to 1987. |
|
|
| - "The Complete CBI Manual of Operations" by Video Vindicator and Kludge, |
| dated October 10, 1991. |
|
|
| Aftermath |
| ~~~~~~~~~ |
| On April 23, 1992, a search warrant was issued in the municipal court of the State of California in the county of San Diego which authorized the seizure of: |
|
|
| A. All telephone company subscriber information to include service start date, |
| copy of most current billing statement, current credit information, and |
| location of telephone service to the following telephone numbers; |
| (619)XXX-XXXX and (619)XXX-XXXX and any other telephone number information |
| in any chain of call forwarding, to or from the listed phone numbers. |
|
|
| B. All telephone company records which includes subscriber information, |
| service start date, copy of most current billing statement, current credit |
| information, and location of telephone service phone numbers to which calls |
| are being forwarded to or from, from the listed phone numbers. |
|
|
| CERTIFICATION TO DEFER NOTIFICATION TO SUBSCRIBER |
|
|
| The Court finds there is substantial probable cause to believe |
| notification to the subscriber whose activities are recorded in the |
| records described above would impede or destroy this investigation. |
| Accordingly, the court certifies the request of the San Diego Police |
| Department that notification to the subscriber be deferred pending |
| further order of this court. |
|
|
|
|
| On April 30, 1992, a search warrant was issued in the municipal court of the |
| State of California in the county of San Diego which authorized the search of |
| Kludge's residence and the seizure of: |
|
|
| All computer equipment and paraphernalia use in computer hacking, or apart |
| of the BBS known as Scantronics which includes, but is not limited to |
| monitor(s), keyboard(s), CPU(s), which may or may not contain hard disk |
| drive(s), floppy drive(s), tape drive(s), CD rom drive(s), modem(s), |
| fax/modem(s), all hard copies (paper copies) of any computer files which |
| have been stored or currently stored on/in a computer system, all |
| documents whether in hard or data form which show how to operate any |
| computer program or computer file, all memory storage devices which may |
| include hard disk drive(s), 5 1/4" and 3 1/2" computer memory storage |
| disks, all computer memory storage and computer back up tapes, and all |
| computer CD rom disks capable of computer data storage; and, documents and |
| effects which tend to show dominion and control over said premises and |
| computer system, including fingerprints, records, handwritings, documents |
| and effects which bear a form of identification such as a person's name, |
| photograph, social security number, or driver's license number and keys. |
|
|
| The warrant was used immediately and Scantronics BBS and much more was seized. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| The Crypt Keeper Responds |
| ~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Date: Wed, 17 Jun 92 09:13:50 PDT |
| From: tck@bend.UCSD.EDU (Kevin Marcus) |
| To: knight@eff.org |
| Subject: Hmm. |
|
|
| I'll start at the beginning... |
|
|
| On April 3rd, I arrived at my workplace (a computer store) around 3 pm. |
| Multiplexor is sitting in the back with some FBI agent and Detective Dennis |
| Sadler. The reason they chose my store for technical support is because Dennis |
| and one of my managers are very good friends. |
|
|
| I saw what was happening, and I saw Multiplexor call up Kludge's board and try |
| to log on, but alas he was not validated. Nonetheless, that same day I told |
| Gatsby and Kludge what was up, because they are/were my friends and I didn't |
| want something bad to happen to them. |
|
|
| A few days later, my boss suggested that I tell Dennis that I was on Kludge's |
| board awhile ago, but that I was not anymore because they might have found |
| something on me. So the next time I saw him (he comes in about once a week, |
| still), I told him that I was on the board awhile ago, but that I wasn't |
| anymore. He asked a few stupid questions and I didn't really say a whole bunch |
| about. |
|
|
| He eventually found out that I had warned Kludge about his board. I am not |
| really sure how, I sure as heck didn't tell him. He then told me that I |
| nearly blew their investigation and for interfering with an investigation the |
| maximum penalty was like 5 years or something like that. He was getting ready |
| to arrest me and take me down to the county courthouse when my boss was able to |
| convince him that I was a good kid, not looking for trouble, and that I would |
| get him something to re-strengthen. So, even though Dennis didn't tell me |
| specifically to get something from Kludge's board, he told me that what he |
| needed to get his case back up to par was an idea of what was on the board, |
| like a buffering of his system. |
|
|
| That night I called up Gatsby and got his password from him. I called and |
| buffered. The next time that I saw him [Sadler], I told him what I had done. |
| He wanted to know how I got on Kludge's board, and I told him through a |
| friend's account. He asked me which friend, and I said "The Gatsby." He then |
| started asking me a bunch of questions about Gatsby such as, "What is his real |
| name?" And, at first I said that I didn't want to tell him, and then he said |
| that I was withholding evidence and he could bust me on that alone. So I told |
| him his name and that he lived in XXXXX (a suburb of San Diego). They already |
| had him and Kludge in phone conversations over Kludge's line since it was taped |
| for a while so they knew who he was in the first place. |
|
|
| If Sadler didn't have anything hanging over my head, such as interfering with |
| an investigation, and/or withholding evidence, then I would not have said jack, |
| more than likely. My first contact with him was on suggestion of my boss, who |
| is a good friend of his, and he might have told my boss something which made |
| him worry and think that I would be arrested for something, I do not know. |
|
|
| Now, if I was a nark, then I can assure you that a LOT more people would have |
| gone down. I have a plethora of information on who is who, who is where, who |
| does what, etc. and, even though it's old, I bet a lot of it is true. If I |
| wanted there to be another Operation Sun-Devil, then I would have given all of |
| that information to him. But I didn't, because that is not at all what I had |
| wanted. I didn't want anyone to get busted (including myself) for anything. |
|
|
| If I were a nark, then I would probably have given him a lot more information, |
| wouldn't you think? |
|
|
| I sure do. |
|
|
| I am not asking anyone to forget about it. I know that I screwed up, but there |
| is not a whole bunch about it that I can do right now. |
|
|
| When Sadler was here asking me questions, it didn't pop into my mind that I |
| should tell him to wait and then go and call my attorney, and then a few |
| minutes later come back and tell him whatever my lawyer said. I was scared. |
| _______________________________________________________________________________ |
|
|
| Hackers Aren't The Real Enemy June 8, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Chris Goggans (ComputerWorld)(Page 37) |
|
|
| (Goggans is a 23-year old hacker who is currently seeking employment with |
| anyone who won't make him cut his hair.) |
|
|
| For years articles have been published about people who call themselves |
| "hackers." These have been written by people who have investigated hackers, |
| who have been the targets of hackers, who secure systems against hackers and |
| who claim to know hackers. As a member of the so-called "computer |
| underground," I would like to present the hacker's point of view. |
|
|
| I hope you will put aside any personal bias you may have toward people who call |
| themselves hackers because it is probably based on media reports rather than |
| real contact. |
|
|
| I also hope you won't refuse to read this because you have a problem with my |
| ethics. Over the past 11 years, operating under the pseudonym Erik Bloodaxe, I |
| had opportunities to become rich beyond the dreams of avarice and wreak great |
| havoc on the world's computer networks. Yet I have done neither. I have |
| looked behind doors that were marked "employees only" but have never disrupted |
| the operation of business. Voyeurism is a far cry from rape. |
|
|
| Illegal, but not criminal |
|
|
| Undeniably, the actions of some hackers are illegal, but they are still hardly |
| criminal in nature. The intention of most of these individuals is not to |
| destroy or exploit systems but merely to learn in minute detail how they are |
| used and what they are used for. The quest is purely intellectual, but the |
| drive to learn is so overwhelming that any obstacle blocking its course will be |
| circumvented. Unfortunately, the obstacles are usually state and federal laws |
| on unauthorized computer access. |
|
|
| The overwhelming difference between today's hackers and their 1960s MIT |
| namesakes is that many of my contemporaries began their endeavors too young to |
| have ready access to computer systems. Few 13-year-olds find themselves with |
| system privileges on a VAX through normal channels. |
|
|
| My own first system was an Atari 8-bit computer with 16K of memory. I soon |
| realized that the potential of such a machine was extremely limited. With the |
| purchase of a modem, however, I was able to branch out and suddenly found |
| myself backed by state-of-the-art computing power at remote sites across the |
| globe. Often, I was given access by merely talking to administrators about the |
| weak points in their systems, but most often my only access was whatever |
| account I may have stumbled across. |
|
|
| Many people find it hard to understand why anyone would risk prosecution just |
| to explore a computer system. I have asked myself that same question many |
| times and cannot come up with a definitive answer. I do know that it is an |
| addiction so strong that it can, if not balanced with other activities, lead to |
| total obsession. Every hacker I know has spent days without sleep combing the |
| recesses of a computer network, testing utilities and reading files. Many |
| times I have become so involved in a project that I have forgotten to eat. |
|
|
| Hackers share almost no demographic similarities: They are of all income |
| levels, races, colors and religions and come from almost every country. There |
| are some shared characteristics, however. Obsessive-compulsive behavior (drug |
| or alcohol abuse, gambling, shoplifting) is one. Others have a history of |
| divorce in their families, intelligence scores in the gifted to genius level, |
| poor study habits and a distrust of any authority figure. Most hackers also |
| combine inherent paranoia and a flair for the romantic -- which is apparent in |
| the colorful pseudonyms in use throughout the hacker community. |
|
|
| In most cases, however, once hackers reach college age -- or, at minimum, the |
| age of legal employment -- access to the systems they desire is more readily |
| available through traditional means, and the need to break a law to learn is |
| curtailed. |
|
|
| Popular media has contributed greatly to the negative use of the word "hacker." |
| Any person found abusing a long-distance calling card or other credit card is |
| referred to as a hacker. Anyone found to have breached computer security on a |
| system is likewise referred to as a hacker and heralded as a computer whiz, |
| despite the fact that even those with the most basic computer literacy can |
| breach computer security if they put their minds to it. |
|
|
| Although the media would have you believe otherwise, all statistics show that |
| hackers have never been more than a drop in the bucket when it comes to serious |
| computer crime. In fact, hackers are rarely more than a temporary nuisance, if |
| they are discovered at all. The real danger lies in the fact that their |
| methods are easily duplicated by people whose motives are far more sinister. |
| Text files and other information that hackers write on computer systems can be |
| used by any would-be corporate spy to help form his plan of attack on a |
| company. |
|
|
| Given that almost everyone is aware of the existence and capabilities of |
| hackers -- and aware of how others can go through the doors hackers open -- the |
| total lack of security in the world's computers is shocking. |
|
|
| Points of entry |
|
|
| The primary problem is poor systems administration. Users are allowed to |
| select easily guessed passwords. Directory permissions are poorly set. Proper |
| process accounting is neglected. Utilities to counter these problems exist for |
| every operating system, yet they are not widely used. |
|
|
| Many systems administrators are not provided with current information to help |
| them secure their systems. There is a terrible lack of communication between |
| vendors and customers and inside the corporate community as a whole. |
|
|
| Rather than inform everyone of problems when they are discovered, vendors keep |
| information in secret security databases or channel it to a select few through |
| electronic-mail lists. This does little to help the situation, and, in fact, |
| it only makes matters worse because many hackers have access to these databases |
| and to archives of the information sent in these mailing lists. |
|
|
| Another major problem in system security comes from telecommunications |
| equipment. The various Bell operating companies have long been the targets of |
| hackers, and many hackers know how to operate both corporate and central office |
| systems better than the technicians who do so for a living. |
|
|
| Increased use of computer networks has added a whole new dimension of |
| insecurity. If a computer is allowed to communicate with another on the same |
| network, every computer in the link must be impenetrable or the security of all |
| sites is in jeopardy. The most stunning examples of this occur on the |
| Internet. With such a wide variety of problems and so little information |
| available to remedy them, the field of computer security consulting is growing |
| rapidly. Unfortunately, what companies are buying is a false sense of |
| security. The main players seem to be the national accounting firms. Their |
| high-cost audits are most often procedural in nature, however, and are rarely |
| conducted by individuals with enough technical expertise to make |
| recommendations that will have a real and lasting effect. |
|
|
| Ultimately, it is the responsibility of the systems administrators to ensure |
| that they have the proper tools to secure their sites against intrusion. |
| Acquiring the necessary information can be difficult, but if outsiders can get |
| their hands on this information, so can the people who are paid to do the job. |
| _______________________________________________________________________________ |
|
|
| THE GREAT DEBATE |
|
|
| Phiber Optik v. Donn Parker |
|
|
| Cyberpunk Meets Mr. Security June 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Jonathan Littman (PC Computing Magazine)(Page 288) |
|
|
| The boy cautiously approached the table and asked the tall, distinguished bald |
| gentleman in the gray suit if he could join him. The boy's conference name tag |
| read Phiber Optik; the gentleman's read Donn Parker. One was a member of the |
| Legion of Doom, the infamous sect of teenage hackers charged with fraud, |
| conspiracy, and illegal computer access in 1990; the other was a legendary |
| security expert. |
|
|
| The unlikely pair had been brought together by an unusual gathering, the |
| nation's first Computers, Freedom, and Privacy conference, held in the San |
| Francisco Bay Area on the last weekend of March 1991. They were part of an |
| eclectic mix of G-men, Secret Service agents, prosecutors, privacy advocates, |
| and hackers who had come to see the other side up close. |
|
|
| Only weeks before, Optik's laptop computer had been seized by state police in |
| an investigation begun by the Secret Service. Optik and fellow hackers Acid |
| Phreak and Scorpion were among the first to come under the scrutiny of the |
| Secret Service in the days of Operation Sun Devil, a 14-city sweep in the |
| spring of 1990 that resulted in 42 seized computers, 23,000 confiscated disks, |
| and four arrests. |
|
|
| The criminal charges brought against Optik and his cohort included illegal |
| computer access and trading in stolen access codes. Optik, a juvenile at the |
| time of his initial questioning, spent a day in jail and was later convicted of |
| a misdemeanor for theft of services. |
|
|
| Parker knew the story well. Over the last two decades, the former Lutheran |
| Sunday school teacher has interviewed dozens of criminals to whom computers |
| were simply the tools of the trade. Along the way, he earned a worldwide |
| reputation as the bald eagle of computer crime. Parker speaks frequently to |
| law-enforcement agencies and corporations as a consultant to SRI International, |
| a leading research and management firm based in Menlo Park, California. His |
| books Fighting Computer Crime and Crime by Computer, countless articles, and a |
| large Justice Department study on computer ethics have established him as the |
| foremost authority on the hacker psyche. |
|
|
| PARKER: How do you view the ethics of getting into someone's computer system? |
|
|
| OPTIK: I know what your point of view is because I've read your papers and |
| I've listened to you talk. I know that you think any entry, you know, |
| any unauthorized entry, is criminal. |
|
|
| I can't say I agree with that. I do agree that anyone who's an |
| impressionable teenager, who's on the scene and wants to break into as |
| many computers as is humanly possible to prove a point, has the |
| potential to do damage, because they're juveniles and have no idea what |
| they're doing, and they're messing around in places that they have no |
| business being. |
|
|
| At the time, I was 17 years old and still a minor. There was no way I |
| was going to be able to buy a Unix, a VAX, my own switching system. |
| These are the things I'm interested in learning how to program. It |
| would not have been possible to access this type of computer |
| development environment had I not learned how to break into systems. |
| That's the way I see it. |
|
|
| PARKER: What are you doing at this conference? What's your purpose? |
|
|
| OPTIK: Basically I want to be exposed to as many people as possible and hear |
| as many people's views as I can. |
|
|
| PARKER: What's your ultimate purpose then-what would you like to do as far as |
| a career? Do you think this is a way for you to get into a career? |
|
|
| OPTIK: Well, of course, I hope to enter the computer industry. Just by being |
| here, I hope to talk to people like you, the many people who are |
| professionals in the field, hear their views, have them hear my views. |
|
|
| See, the thing I regret the most is that there is this communication |
| gap, a lack of dialogue between people who proclaim themselves to be |
| hackers and people who are computer professionals. I think if there |
| were a better dialogue among the more respectable type of hackers and |
| the computer professionals, then it would be a lot more productive. |
|
|
| PARKER: How do you tell the difference between a more responsible type of |
| hacker? |
|
|
| OPTIK: I realize that its a very big problem. I can see that it's pretty |
| impossible to tell, and I can clearly understand how you come to the |
| conclusions that you initially state in your paper about how hackers |
| have been known to cheat, lie, and exaggerate. I experienced that |
| firsthand all the time. I mean, these people are generally like that. |
| Just keep in mind that a large number of them aren't really hardcore |
| hackers -- they're impressionable teenagers hanging out. Its just that |
| the medium they're using to hang out is computers. |
|
|
| I don't consider myself part of that crowd at all. I got into |
| computers early on. Like when I was entering junior high school. I was |
| really young, it must have been preteen years. I'm talking about 12 or |
| 13 years old when I got a computer for Christmas. |
|
|
| I didn't immediately go online. I'm not one of these kids today that |
| get a Commodore 64 with a modem for Christmas because they got good |
| grades on their report card. The reason I would have called myself a |
| hacker is, I was hacking in the sense of exploring the world inside my |
| computer, as far as assembly language, machine language, electronics |
| tinkering, and things of that nature. That truly interested me. |
|
|
| The whole social online thing I could really do without because that's |
| where these ideas come from. You know, this whole negative, this bad |
| aftertaste I get in my mouth when I hear people put down the whole |
| hacking scene. Its because of what they're hearing, and the reason |
| they're hearing this is because of the more outspoken people in this |
| "computer underground" and the twisted coverage in the media, which is |
| using this whole big hype to sell papers. |
|
|
| And the people who are paying the price for it are people like me; and |
| the people who are getting a twisted view of things are the |
| professionals, because they're only hearing the most vocal people. |
| It's another reason why I'm here, to represent people like myself, who |
| want other people to know there are such things as respectable hackers. |
| You know hacking goes beyond impressionable young teenage delinquents. |
|
|
| PARKER: How would you define hacking? |
|
|
| OPTIK: It's this overall wanting to understand technology, to be able to |
| communicate with a machine on a very low level, to be able to program |
| it. Like when I come upon a computer, it's like my brain wants to talk |
| to its microprocessor. That's basically my philosophy. |
|
|
| PARKER. And does it matter to you who actually owns the computer? |
|
|
| OPTIK: Usually it does. Oh, at first it didn't matter. The mere fact of |
| getting into Unix, and learning Unix, was important enough to warrant |
| me wanting to be on the system. Not because of information that was in |
| there. I really don't care what the information is. |
|
|
| You know there's that whole Cyberpunk genre that believes information |
| should be free. I believe in computer privacy wholly. I mean if |
| someone wants something to be private, by all means let it be private. |
| I mean, information is not meant for everyone to see if you design it |
| as being private. That's why there is such a thing as security. |
|
|
| If someone wants to keep something private, I'm not going to try to |
| read it. It doesn't interest me. I couldn't care less what people are |
| saying to each other on electronic mail. I'm there because I'm |
| interested in the hardware. |
|
|
| PARKER: How is anyone else going to know that you're not interested in reading |
| their private mail? |
|
|
| OPTIK: That's a problem I have to deal with. There's not a real solution in |
| the same way that there's no way that you're really going to be able |
| to tell whether someone's malicious or not. Hackers do brag, cheat, |
| and exaggerate. They might tell you one thing and then stab you in the |
| back and say something else. |
|
|
| PARKER: I've interviewed over 120 so-called computer criminals. |
|
|
| OPTIK: Right. |
|
|
| PARKER: I've interviewed a lot of hackers, and I've also interviewed a lot of |
| people engaged in all kinds of white-collar crime. |
|
|
| OPTIK: Yeah. |
|
|
| PARKER: And it seems to me that the people I have talked with that have been |
| convicted of malicious hacking and have overcome and outgrown that |
| whole thing have gone into legitimate systems programming jobs where |
| there is great challenge, and they're very successful. They are not |
| engaged in malicious hacking or criminal activity, and they're making a |
| career for themselves in technology that they love. |
|
|
| OPTIK: Right. |
|
|
| PARKER: Why couldn't you go that route? Why couldn't you get your credentials |
| by going to school like I did and like everybody else did who functions |
| as a professional in the computer field, and get a challenging job in |
| computer technology? |
|
|
| OPTIK: I certainly hope to get a challenging job in computer technology. But |
| I just feel that where I live, and the way the school system is where I |
| am, it doesn't cater to my needs of wanting to learn as much about |
| technology as fast as I want to learn. |
|
|
| PARKER: Yeah, but one of the things you have to learn, I guess, is patience, |
| and you have to be willing to work hard and learn the technology as |
| it's presented. |
|
|
| OPTIK: You know, you just have to remember that by being able to go places |
| that people shouldn't, I'm able to learn things about technology that |
| schools don't teach. It's just that programs in local colleges where I |
| am, they couldn't even begin to grasp things that I've experienced. |
|
|
| PARKER: OK, so you want instant gratification then. |
|
|
| OPTIK: It's not so much gratification . . . |
|
|
| PARKER: You're not willing to spend four years in a-- |
|
|
| OPTIK: I certainly am willing to go to college. |
|
|
| PARKER: Uh huh. |
|
|
| OPTIK: I definitely intend to go to college; I just don't expect to learn very |
| much concerning technology. I do expect to learn some things about |
| technology I probably didn't know, but I don't expect to be exposed to |
| such a diverse amount of technology as in my teenage years. |
|
|
| PARKER: OK, well, I can see impatience and a lack of opportunity to do all |
| that stuff very quickly, but-- |
|
|
| OPTIK: I wouldn't go so far as to call it impatience. I'd call it an |
| eagerness to learn. |
|
|
| PARKER: Eagerness to learn can be applied in the establishment process of |
| education in all kinds of ways. You can excel in school. |
|
|
| OPTIK: I was never Mr. Academia, I can tell you that right off the bat. I |
| don't find much of interest in school. Usually I make up for it by |
| reading technology manuals instead. |
|
|
| PARKER: How are you going to spend four years in school if you've already |
| decided you're really not suited to be in school? |
|
|
| OPTIK: Well, it's not so much school as it is that I feel constrained being in |
| high school and having to go through junior high school and high school |
| because of the way the educational program are tailored to like, you |
| know -- |
|
|
| PARKER: Well, if you hold this direction that you're going right now, you could |
| very well end up as a technician repairing equipment, maintaining |
| computers, and you could very well end up in a dead-end job. |
|
|
| In order to break into a higher level of work, you need a ticket, you |
| need a degree, you have to prove that you have been able to go to |
| school and get acceptable grades. The route that you're going doesn't |
| seem to me to lead to that. |
|
|
| Now there are some people who have managed to overcome that, OK -- |
| Geoff Goodfellow. Steve Wozniak. But those people are 1 out of |
| 100,000. All the other 99,000-odd people are technicians. They're |
| leading reasonable lives, making a reasonable income, but they're not |
| doing very big things. They're keeping equipment running. |
|
|
| OPTIK: Yeah. |
|
|
| PARKER: And if you have all this curiosity and all this drive and this energy |
| (which is what it takes), and you go a route that gets you to a |
| position where you can do real, exciting, advanced research . . . I |
| mean, I've talked to a lot of hackers. I'm thinking of one in |
| Washington, D.C., who was convicted of a computer crime. He went back |
| to school, he's got his degree, and he has a very top systems |
| programming job. He said he finally reached a point where he decided |
| he had to change the way he was going about this, because the way |
| things were going, the future for him was pretty bleak. |
|
|
| And it seems to me, hopefully, you may come to a realization that to |
| do important things, exciting things, ultimately you've got to learn |
| the computer-science way of presenting operating systems, and how to |
| write programs of a very large, complex nature. |
|
|
| Have you ever done that, have you ever written a really big computer |
| program? |
|
|
| OPTIK: I've written this . . . |
|
|
| PARKER: There's a discipline involved that has to do with learning how to be an |
| engineer. It takes a tremendous amount of education and discipline. |
| And it sounds to me like you lack the discipline. You want instant |
| gratification, you want to be an expert now. And you end up being an |
| expert all right, but in a very narrow range of technology. |
|
|
| You learn the Novell LAN, you learn some other aspect, you learn about |
| a telephone company's switching system. That doesn't lead to a career |
| in designing and developing systems. That leads to a career in |
| maintaining the kind of hardware that you've been hacking. |
|
|
| And it seems to me you've got to go back and learn the principles. |
| What are the basic principles of an operating system? What are the |
| basic principles of access control? Until you've gone back and learned |
| those basics, you're flying by the seat of your pants, and just picking |
| up odds and ends of stuff that you can grab quickly. |
|
|
| OPTIK: I don't see it so much as grabbing things quickly. I've put a lot of |
| time into studying very detailed things. It's not so much popping in |
| and popping out and whatever I find I'm glad I found it. I do spend a |
| lot of time studying manuals and things. |
|
|
| PARKER: Manuals are not going to do it. All you do in learning a manual is |
| learn the current equipment and how it works. If you studied Donald |
| Kanuth's volumes on computer science programming and computer sciences, |
| you would learn the theory of computer programming, you would learn |
| the operating system theory, you would learn the theory that is the |
| foundation on which all of these systems are built. |
|
|
| OPTIK: But that's the thing I guess I don't do. I was never much concerned |
| with theory of operation. I was always concerned with how things work, |
| and how I can use them. Like how to program. I'll admit I was never |
| much into theory. It never interested me. Like with what I do-theory |
| really doesn't play any role at the present time. Of course, that's |
| subject to change at any time. I'm rather young . . . |
|
|
| A FRIEND WHISPERED in Optik's ear that it was time to go. Still locked in |
| debate, the hacker and the security man left the table and walked together |
| toward the escalator. In profile, at the bottom of the moving stairs, they |
| were an odd couple: Optik with his shiny, jet black hair, Parker with his |
| shiny dome. |
|
|
| Parker was speaking calmly, warning Optik that one day hacking wouldn't seem |
| so boundless, that one day his opportunities wouldn't seem quite so vast. |
| Optik fidgeted, glancing away. Conference attendees filed up the escalator. |
|
|
| "I don't want to be a hacker forever," blurted Optik. |
|
|
| The next afternoon the bank of hotel phones was crowded with business people |
| and conference attendees punching in to get their messages and make their |
| calls. There was Optik, wedged between the suits, acoustic coupler slipped |
| over the phone receiver, a laptop screen flickering before his eyes, his hands |
| flitting over the keys. |
|
|
| He was still young. |
|
|