| ==Phrack Inc.== |
|
|
| Volume Four, Issue Forty, File 14 of 14 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Issue 40 / Part 3 of 3 PWN |
| PWN PWN |
| PWN Compiled by Datastream Cowboy PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| Bellcore Threatens 2600 Magazine With Legal Action July 15, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| THE FOLLOWING CERTIFIED LETTER HAS BEEN RECEIVED BY 2600 MAGAZINE. WE WELCOME |
| ANY COMMENTS AND/OR INTERPRETATIONS. |
|
|
| Leonard Charles Suchyta |
| General Attorney |
| Intellectual Property Matters |
|
|
| Emanuel [sic] Golstein [sic], Editor |
| 2600 Magazine |
| P.O. Box 752 |
| Middle Island, New York 11953-0752 |
|
|
| Dear Mr. Golstein: |
|
|
| It has come to our attention that you have somehow obtained and published in |
| the 1991-1992 Winter edition of 2600 Magazine portions of certain Bellcore |
| proprietary internal documents. |
|
|
| This letter is to formally advise you that, if at any time in the future you |
| (or your magazine) come into possession of, publish, or otherwise disclose any |
| Bellcore information or documentation which either (i) you have any reason to |
| believe is proprietary to Bellcore or has not been made publicly available by |
| Bellcore or (ii) is marked "proprietary," "confidential," "restricted," or with |
| any other legend denoting Bellcore's proprietary interest therein, Bellcore |
| will vigorously pursue all legal remedies available to it including, but not |
| limited to, injunctive relief and monetary damages, against you, your magazine, |
| and its sources. |
|
|
| We trust that you fully understand Bellcore's position on this matter. |
|
|
| Sincerely, |
|
|
|
|
| LCS/sms |
|
|
|
|
| LCS/CORR/JUN92/golstein.619 |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Emmanuel Goldstein Responds |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| The following reply has been sent to Bellcore. Since we believe they have |
| received it by now, we are making it public. |
|
|
| Emmanuel Goldstein |
| Editor, 2600 Magazine |
| PO Box 752 |
| Middle Island, NY 11953 |
|
|
| July 20, 1992 |
|
|
| Leonard Charles Suchyta |
| LCC 2E-311 |
| 290 W. Mt. Pleasant Avenue |
| Livingston, NJ 07039 |
|
|
| Dear Mr. Suchyta: |
|
|
| We are sorry that the information published in the Winter 1991-92 issue of 2600 |
| disturbs you. Since you do not specify which article you take exception to, we |
| must assume that you're referring to our revelation of built-in privacy holes |
| in the telephone infrastructure which appeared on Page 42. In that piece, we |
| quoted from an internal Bellcore memo as well as Bell Operating Company |
| documents. This is not the first time we have done this. It will not be the |
| last. |
|
|
| We recognize that it must be troubling to you when a journal like ours |
| publishes potentially embarrassing information of the sort described above. |
| But as journalists, we have a certain obligation that cannot be cast aside |
| every time a large and powerful entity gets annoyed. That obligation compels |
| us to report the facts as we know them to our readers, who have a keen interest |
| in this subject matter. If, as is often the case, documents, memoranda, and/or |
| bits of information in other forms are leaked to us, we have every right to |
| report on the contents therein. If you find fault with this logic, your |
| argument lies not with us, but with the general concept of a free press. |
|
|
| And, as a lawyer specializing in intellectual property law, you know that you |
| cannot in good faith claim that merely stamping "proprietary" or "secret" on a |
| document establishes that document as a trade secret or as proprietary |
| information. In the absence of a specific explanation to the contrary, we must |
| assume that information about the publicly supported telephone system and |
| infrastructure is of public importance, and that Bellcore will have difficulty |
| establishing in court that any information in our magazine can benefit |
| Bellcore's competitors, if indeed Bellcore has any competitors. |
|
|
| If in fact you choose to challenge our First Amendment rights to disseminate |
| important information about the telephone infrastructure, we will be compelled |
| to respond by seeking all legal remedies against you, which may include |
| sanctions provided for in Federal and state statutes and rules of civil |
| procedure. We will also be compelled to publicize your use of lawsuits and the |
| threat of legal action to harass and intimidate. |
|
|
| Sincerely, |
|
|
| Emmanuel Goldstein |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Exposed Hole In Telephone Network Draws Ire Of Bellcore July 24, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Taken from Communications Daily (Page 5) |
|
|
| Anyone Can Wiretap Your Phone |
|
|
| Major security hole in telephone network creates "self-serve" monitoring |
| feature allowing anyone to listen in on any telephone conversation they choose. |
| Weakness involves feature called Busy Line Verification (BLV), which allows |
| phone companies to "break into" conversation at any time. BLV is used most |
| often by operators entering conversation to inform callers of emergency |
| message. But BLV feature can be used by anyone with knowledge of network's |
| weakness to set up ad hoc 'wiretap' and monitor conversations, said Emmanuel |
| Goldstein, editor of 2600 Magazine, which published article in its Winter 1991 |
| issue. |
|
|
| 2600 Magazine is noted for finding and exposing weaknesses of |
| telecommunications. It's named for frequency of whistle, at one time given |
| away with Cap'n Crunch cereal, which one notorious hacker discovered could, |
| when blown into telephone receiver, allow access to open 800 line. Phone |
| companies have since solved that problem. |
|
|
| Security risks are outlined in article titled "U.S. Phone Companies Face Built- |
| In Privacy Hole" that quotes from internal Bellcore memo and Bell Operating Co. |
| documents: "'A significant and sophisticated vulnerability' exists that could |
| affect the security and privacy of BLV." Article details how, after following 4 |
| steps, any line is susceptible to secret monitoring. One document obtained by |
| 2600 said: "There is no proof the hacker community knows about the |
| vulnerability." |
|
|
| When Bellcore learned of article, it sent magazine harsh letter threatening |
| legal action. Letter said that if at any time in future magazine "comes into |
| possession of, publishes, or otherwise discloses any Bellcore information" |
| organization will "vigorously pursue all legal remedies available to it |
| including, but not limited to, injunctive and monetary damages." Leonard |
| Suchyta, Bellcore General Attorney for Intellectual Property Matters, said |
| documents in magazine's possession "are proprietary" and constitute "a trade |
| secret" belonging to Bellcore and its members -- RBOCs. He said documents are |
| "marked with 'Proprietary' legend" and "the law says you can't ignore this |
| legend, its [Bellcore's] property." Suchyta said Bellcore waited so long to |
| respond to publication because "I think the article, as we are not subscribers, |
| was brought to our attention by a 3rd party." He said this is first time he |
| was aware that magazine had published such Bellcore information. |
|
|
| But Goldstein said in reply letter to Bellcore: "This is not the first time we |
| have done this. It will not be the last." He said he thinks Bellcore is |
| trying to intimidate him, "but they've come up against the wrong publication |
| this time." Goldstein insisted that documents were leaked to his magazine: |
| "While we don't spread the documents around, we will report on what's contained |
| within." Suchyta said magazine is obligated to abide by legend stamped on |
| documents. He said case law shows that the right to publish information hinges |
| on whether it "has been lawfully acquired. If it has a legend on it, it's sort |
| of hard to say it's lawfully acquired." |
|
|
| Goldstein said he was just making public what already was known: There's known |
| privacy risk because of BLV weakness: "If we find something out, our first |
| instinct is to tell people about it. We don't keep things secret." He said |
| information about security weaknesses in phone network "concerns everybody." |
| Just because Bellcore doesn't want everyone to know about its shortcomings and |
| those of telephone network is hardly reason to stifle that information, |
| Goldstein said. "Everybody should know if their phone calls can be listened in |
| on." |
|
|
| Suchyta said that to be considered "valuable," information "need not be of |
| super, super value," like proprietary software program "where you spent |
| millions of dollars" to develop it. He said information "could well be your |
| own information that would give somebody an advantage or give them some added |
| value they wouldn't otherwise have had if they had not taken it from you." |
| Goldstein said he was "sympathetic" to Bellcore's concerns but "fact is, even |
| when such weaknesses are exposed, [phone companies] don't do anything about |
| them." He cited recent indictments in New York where computer hackers were |
| manipulating telephone, exploiting weaknesses his magazine had profiled long |
| ago. "Is there any security at all [on the network]?" he said. "That's the |
| question we have to ask ourselves." |
|
|
| Letter from Bellcore drew burst of responses from computer community when |
| Goldstein posted it to electronic computer conference. Lawyers specializing in |
| computer law responded, weighing in on side of magazine. Attorney Lance Rose |
| said: "There is no free-floating 'secrecy' right . . . Even if a document says |
| 'confidential' that does not mean it was disclosed to you with an understanding |
| of confidentiality -- which is the all-important question." Michael Godwin, |
| general counsel for Electronic Frontier Foundation, advocacy group for the |
| computer community, said: "Trade secrets can qualify as property, but only if |
| they're truly trade secrets. Proprietary information can (sort of) qualify as |
| property if there's a breach of a fiduciary duty." Both lawyers agreed that |
| magazine was well within its rights in publishing information. "If Emmanuel |
| did not participate in any way in encouraging or aiding in the removal of the |
| document from Bellcore . . . that suggests he wouldn't be liable," Godwin said. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Bellcore And 2600 Dispute Publishing Of Article July 27, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Barbara E. McMullen & John F. McMullen (Newsbytes) |
|
|
| MIDDLE ISLAND, NY -- Eric Corley a/k/a "Emmanuel Goldstein", editor and |
| publisher of 2600 Magazine: The Hacker Quarterly, has told Newsbytes that he |
| will not be deterred by threats from Bellcore from publishing material which he |
| considers important for his readership. |
|
|
| Earlier this month, Corley received a letter (addressed to "Emanuel Golstein") |
| from Leonard Charles Suchyta, General Attorney, Intellectual Property Matters |
| at Bellcore taking issue with the publication by 2600 of material that Suchyta |
| referred to as "portions of certain Bellcore proprietary internal documents." |
|
|
| The letter continued "This letter is to formally advise you that, if at any |
| time in the future you (or your magazine) come into possession of, publish, or |
| otherwise disclose any Bellcore information or documentation which either (i) |
| you have any reason to believe is proprietary to Bellcore or has not been made |
| publicly available by Bellcore or (ii) is marked "proprietary," "confidential," |
| "restricted," or with any other legend denoting Bellcore's proprietary interest |
| therein, Bellcore will vigorously pursue all legal remedies available to it |
| including, but not limited to, injunctive relief and monetary damages, against |
| you, your magazine, and its sources." |
|
|
| While the letter did not mention any specific material published by 2600, |
| Corley told Newsbytes that he believes that Suchyta's letter refers to an |
| article entitled "U.S. Phone Companies Face Built-In Privacy Hole".that appears |
| on page 42 of the Winter 1991 issue. Corley said "What we published was |
| derived from a 1991 internal Bellcore memo as well as Bell Operating Company |
| documents that were leaked to us. We did not publish the documents. However, |
| we did read what was sent to us and wrote an article based upon that. The |
| story focuses on how the phone companies are in an uproar over a 'significant |
| and sophisticated vulnerability' that could result in BLV (busy line |
| verification) being used to listen in on phone calls." |
|
|
| The 650-word article said, in part, "By exploiting a weakness, it's possible |
| to remotely listen in on phone conversations at a selected telephone number. |
| While the phone companies can do this any time they want, this recently |
| discovered self-serve monitoring feature has created a telco crisis of sorts." |
|
|
| The article further explained how people might exploit the security hole, |
| saying "The intruder can listen in on phone calls by following these four |
| steps: |
|
|
| "1. Query the switch to determine the Routing Class Code assigned to the BLV |
| trunk group. |
| "2. Find a vacant telephone number served by that switch. |
| "3. Via recent change, assign the Routing Class Code of the BLV trunks to the |
| Chart Column value of the DN (directory number) of the vacant telephone |
| number. |
| "4. Add call forwarding to the vacant telephone number (Remote Call Forwarding |
| would allow remote definition of the target telephone number while Call |
| Forwarding Fixed would only allow the specification of one target per |
| recent change message or vacant line)." |
|
|
| "By calling the vacant phone number, the intruder would get routed to the BLV |
| trunk group and would then be connected on a "no-test vertical" to the target |
| phone line in a bridged connection." |
|
|
| The article added "According to one of the documents, there is no proof that |
| the hacker community knows about the vulnerability. The authors did express |
| great concern over the publication of an article entitled 'Central Office |
| Operations - The End Office Environment' which appeared in the electronic |
| newsletter Legion of Doom/Hackers Technical Journal. In this article, |
| reference is made to the 'No Test Trunk'." |
|
|
| The article concludes "even if hackers are denied access to this "feature", |
| BLV networks will still have the capability of being used to monitor phone |
| lines. Who will be monitored and who will be listening are two forever |
| unanswered questions." |
|
|
| Corley responded to to Suchyta's letter on July 20th, saying "I assume that |
| you're referring to our revelation of built-in privacy holes in the telephone |
| infrastructure which appeared on Page 42. In that piece, we quoted from an |
| internal Bellcore memo as well as Bell Operating Company documents. This is |
| not the first time we have done this. It will not be the last. |
|
|
| "We recognize that it must be troubling to you when a journal like ours |
| publishes potentially embarrassing information of the sort described above. |
| But as journalists, we have a certain obligation that cannot be cast aside |
| every time a large and powerful entity gets annoyed. That obligation compels |
| us to report the facts as we know them to our readers, who have a keen interest |
| in this subject matter. If, as is often the case, documents, memoranda, and/or |
| bits of information in other forms are leaked to us, we have every right to |
| report on the contents therein. If you find fault with this logic, your |
| argument lies not with us, but with the general concept of a free press. |
|
|
| "And, as a lawyer specializing in intellectual property law, you know that |
| you cannot in good faith claim that merely stamping "proprietary" or "secret" |
| on a document establishes that document as a trade secret or as proprietary |
| information. In the absence of a specific explanation to the contrary, we must |
| assume that information about the publicly supported telephone system and |
| infrastructure is of public importance, and that Bellcore will have difficulty |
| establishing in court that any information in our magazine can benefit |
| Bellcore's competitors, if indeed Bellcore has any competitors. |
|
|
| "If in fact you choose to challenge our First Amendment rights to disseminate |
| important information about the telephone infrastructure, we will be compelled |
| to respond by seeking all legal remedies against you, which may include |
| sanctions provided for in Federal and state statutes and rules of civil |
| procedure. We will also be compelled to publicize your use of lawsuits and the |
| threat of legal action to harass and intimidate. |
|
|
| Sincerely, |
| Emmanuel Goldstein" |
|
|
| Corley told Newsbytes "Bellcore would never have attempted this with the New |
| York Times. They think that it would, however, be easy to shut us up by simple |
| threats because of our size. They are wrong. We are responsible journalists; |
| we know the rules and we abide by them. I will, by the way, send copies of the |
| article in question to anyone who request it. Readers may then judge for |
| themselves whether any boundaries have been crossed." |
|
|
| Corley, who hosts the weekly "Off the Hook" show on New York City's WBAI radio |
| station, said that he had discussed the issue on the air and had received |
| universal support from his callers. Corley also told Newsbytes, that, although |
| he prefers to be known by his nomme de plume (taken from George Orwell's |
| 1984), he understands that the press fells bound to use his actual name. He |
| said that, in the near future, he will "end the confusion by having my name |
| legally changed." |
|
|
| Bellcore personnel were unavailable for comment on any possible response to |
| Corley's letter. |
| _______________________________________________________________________________ |
|
|
| Interview With Ice Man And Maniac July 22, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Joshua Quittner (New York Newsday)(Page 83) |
|
|
| Ice Man and Maniac are two underground hackers in the New England area that |
| belong to a group known as Micro Pirates, Incorporated. They agreed to be |
| interviewed if their actual identities were not revealed. |
|
|
| [Editor's Note: They are fools for doing this, especially in light of how |
| Phiber Optik's public media statements and remarks will |
| ultimately be used against him.] |
|
|
| Q: How do you define computer hacking? |
|
|
| Maniac: Hacking is not exploration of computer systems. It's more of an |
| undermining of security. That's how I see it. |
|
|
| Q: How many people are in your group, Micro Pirates Incorporated? |
|
|
| Ice Man: Fifteen or 14. |
|
|
| Maniac: We stand for similar interests. It's an escape, you know. If I'm not |
| doing well in school, I sit down on the board and talk to some guy in |
| West Germany, trade new codes of their latest conquest. Escape. |
| Forget about the real world. |
|
|
| Ice Man. It's more of a hobby. Why do it? You can't exactly stop. I came |
| about a year-and-a-half ago, and I guess you could say I'm one of the |
| ones on a lower rung, like in knowledge. I do all the -- you wouldn't |
| call it dirty work -- phone calls. I called you -- that kind of |
| thing. |
|
|
| Q: You're a "social engineer"? |
|
|
| Ice Man: Social engineering -- I don't know who coined the term. It's using |
| conversation to exchange information under false pretenses. For |
| example, posing as a telecommunications employee to gain more |
| knowledge and insight into the different [phone network] systems. |
|
|
| Q: What social engineering have you done? |
|
|
| Maniac: We hacked into the system that keeps all the grades for the public |
| school system. It's the educational mainframe at Kingsborough |
| Community College. But we didn't change anything. |
|
|
| Ice Man: They have the mainframe that stores all the schedules, Regents scores, |
| ID numbers of all the students in the New York high school area. You |
| have to log in as a school, and the password changes every week. |
|
|
| Q: How did you get the password? |
|
|
| Ice Man: Brute force and social engineering. I was doing some social |
| engineering in school. I was playing the naive person with an |
| administrator, asking all these questions toward what is it, where is |
| it and how do you get in. |
| |
| Q: I bet you looked at your grades. How did you do? |
|
|
| Ice Man: High 80s. |
|
|
| Q. And you could have changed Regents scores? |
|
|
| Ice Man: I probably wouldn't have gotten away with it, and I wouldn't say I |
| chose not to on a moral basis. I'd rather say on a security basis. |
|
|
| Q: What is another kind of social engineering? |
|
|
| Maniac: There's credit-card fraud and calling-card fraud. You call up and |
| say, "I'm from the AT&T Corporation. We're having trouble with your |
| calling-card account. Could you please reiterate to us your four- |
| digit PIN number?" People, being kind of God-fearing -- as AT&T is |
| somewhat a God -- will say, "Here's my four-digit PIN number." |
|
|
| Q: Hackers from another group, MOD, were arrested recently and charged with, |
| among other things, selling inside information about how to penetrate |
| credit bureaus. Have you cleaned up your act? |
|
|
| Maniac: We understand the dangers of it now. We're not as into it. We |
| understand what people go through when they find out a few thousand |
| dollars have been charged to their credit-card account. |
|
|
| Q: Have you hacked into credit bureaus? |
|
|
| Ice Man: We were going to look up your name. |
|
|
| Maniac: CBI [Credit Bureau International, owned by Equifax, one of the largest |
| national credit bureaus], is pretty insecure, to tell you the truth. |
|
|
| Q: Are you software pirates, too? |
|
|
| Maniac: Originally. Way back when. |
|
|
| Ice Man: And then we branched out and into the hacking area. Software piracy |
| is, in the computer underground, the biggest thing. There are groups |
| like THG and INC, which are international. THG is The Humble Guys. |
| INC is International Network of Crackers, and I've recently found out |
| that it's run by 14 and 15-year-olds. They have people who work in |
| companies, and they'll take the software and they'll crack it -- the |
| software protection -- and then distribute it. |
|
|
| Q: Are there many hacking groups in New York? |
|
|
| Maniac: Three or four. LOD [the Legion of Doom, named by hacker Lex Luthor], |
| MOD, MPI and MOB [Men of Business]. |
|
|
| Q: How do your members communicate? |
|
|
| Ice Man: The communication of choice is definitely the modem [to access |
| underground electronic bulletin boards where members leave messages |
| for each other or "chat" in real time]. After that is the voice mail |
| box [VMB]. VMBs are for communications between groups. |
|
|
| A company, usually the same company that has beepers and pagers and |
| answering services, has a voice-mail-box service. You call up [after |
| hacking out an access code that gives the user the ability to create |
| new voice mail boxes on a system] and can enter in a VMB number. |
| Occasionally they have outdial capabilities that allow you to call |
| anywhere in the world. I call about five every day. It's not really |
| my thing. |
|
|
| Q: Is your group racially integrated? |
|
|
| Ice Man: Half of them are Asian. Also we have, I think, one Hispanic. I never |
| met him. Race, religion -- nobody cares. The only thing that would |
| alienate you in any way would be if you were known as a lamer. If you |
| just took, took, took and didn't contribute to the underground. It's |
| how good you are, how you're respected. |
|
|
| Maniac: We don't work on a racial basis or an ethnic basis. We work on a |
| business basis. This is an organized hobby. You do these things for |
| us and you get a little recognition for it. |
|
|
| Ice Man: Yeah. If you're a member of our group and you need a high-speed |
| modem, we'll give you one, on a loan basis. |
|
|
| Q: How does somebody join MPI? |
|
|
| Maniac: They have to contact either of us on the boards. |
|
|
| Ice Man: And I'll go through the whole thing [with them], validating them, |
| checking their references, asking them questions, so we know what |
| they're talking about. And if it's okay, then we let them in. We |
| have members in 516, 718, 212, 201, 408, and 908. We're talking to |
| someone in Florida, but he's not a member yet. |
|
|
| Q: Are any MPI members in other hacking groups? |
|
|
| Ice Man: I know of no member of MPI that is in any other group. I wouldn't |
| call it betrayal, but it's like being in two secret clubs at one time. |
| I would want them faithful to my group, not any other group. There is |
| something called merging, a combination of both groups that made them |
| bigger and better. A lot of piracy groups did that. |
|
|
| Q: Aren't you concerned about breaking the law? |
|
|
| Maniac: Breaking the law? I haven't gotten caught. If I do get caught, I |
| won't be stupid and say I was exploring -- I'm not exploring. I'm |
| visiting, basically. If you get caught, you got to serve your time. |
| I'm not going to fight it. |
| _______________________________________________________________________________ |
|
|
| FBI Unit Helps Take A Byte Out Of Crime July 15, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Bill Gertz (The Washington Times)(Page A4) |
|
|
| FBI crime busters are targeting elusive computer criminals who travel the world |
| by keyboard, telephone and computer screen and use such code names as "Phiber |
| Optik," "Masters of Disaster," "Acid Phreak" and "Scorpion." |
|
|
| "Law enforcement across the board recognizes that this is a serious emerging |
| crime problem, and it's only going to continue to grow in the future," said |
| Charles L. Owens, chief of the FBI's economic crimes unit. |
|
|
| Last week in New York, federal authorities unsealed an indictment against five |
| computer hackers, ages 18 to 22, who were charged with stealing long-distance |
| phone service and credit bureau information and who penetrated a wide variety |
| of computer networks. |
|
|
| The FBI is focusing its investigations on major intrusions into banking and |
| government computers and when the objective is stealing money, Mr. Owens said |
| in an interview. |
|
|
| FBI investigations of computer crimes have doubled in the past year, he said, |
| adding that only about 11 percent to 15 percent of computer crimes are reported |
| to law enforcement agencies. Because of business or personal reasons, victims |
| often are reluctant to come forward, he said. |
|
|
| Currently, FBI agents are working on more than 120 cases, including at least |
| one involving a foreign intelligence agency. Mr. Owens said half of the active |
| cases involve hackers operating overseas, but he declined to elaborate. |
|
|
| The FBI has set up an eight-member unit in its Washington field office devoted |
| exclusively to solving computer crimes. |
|
|
| The special team, which includes computer scientists, electrical engineers and |
| experienced computer system operators, first handled the tip that led to the |
| indictment of the five hackers in New York, according to agent James C. Settle, |
| who directs the unit. |
|
|
| Computer criminals, often equipped with relatively unsophisticated Commodore 64 |
| or Apple II computers, first crack into international telephone switching |
| networks to make free telephone calls anywhere in the world, Mr. Settle said. |
|
|
| Hackers then can spend up to 16 hours a day, seven days a week, breaking into |
| national and international computer networks such as the academic-oriented |
| Internet, the National Aeronautics and Space Administration's Span-Net and the |
| Pentagon's Milnet. |
|
|
| To prevent being detected, unauthorized computer users "loop and weave" through |
| computer networks at various locations in the process of getting information. |
|
|
| "A lot of it is clearly for curiosity, the challenge of breaking into systems," |
| Mr. Settle said. "The problem is that they can take control of the system." |
|
|
| Also, said Mr. Owens, computer hackers who steal such information from |
| commercial data banks may turn to extortion as a way to make money. |
|
|
| Mr. Settle said there are also "indications" that computer criminals are |
| getting involved in industrial espionage. |
|
|
| The five hackers indicted in New York on conspiracy, computer-fraud, computer |
| tampering, and wire-fraud charges called themselves "MOD," for Masters of |
| Deception or Masters of Disaster. |
|
|
| The hackers were identified in court papers as Julio Fernandez, 18, John Lee, |
| 21, Mark Abene, 20, Elias Ladopoulos, 22, and Paul Stira, 22. All live in the |
| New York City area. |
|
|
| Mr. Fernandez and Mr. Lee intercepted data communications from a computer |
| network operated by the Bank of America, court papers said. |
|
|
| They also penetrated a computer network of the Martin Marietta Electronics |
| Information and Missile Group, according to the court documents. |
|
|
| The hackers obtained personal information stored in credit bureau computers, |
| with the intention of altering it "to destroy people's lives or make them look |
| like saints," the indictment stated. |
| _______________________________________________________________________________ |
|
|
| And Today's Password Is... May 26, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Robert Matthews (The Daily Telegraph)(page 26) |
|
|
| "Ways Of Keeping Out The Determined Hacker" |
|
|
| One of the late Nobel Prize-winning physicist Richard Feynman's favorite |
| stories was how he broke into top-secret atomic bomb files at Los Alamos by |
| guessing that the lock combination was 271828, the first six digits of the |
| mathematical constant "e". Apart from being amusing, Feynman's anecdote stands |
| as a warning to anyone who uses dates, names or common words for their computer |
| password. |
|
|
| As Professor Peter Denning, of George Mason University, Virginia, points out in |
| American Scientist, for all but the most trivial secrets, such passwords simply |
| aren't good enough. Passwords date back to 1960, and the advent of time- |
| sharing systems that allowed lots of users access to files stored on a central |
| computer. It was not long before the standard tricks for illicitly obtaining |
| passwords emerged: Using Feynman-style educated guessing, standing behind |
| computer users while they typed in their password or trying common system |
| passwords like "guest" or "root". The biggest security nightmare is, however, |
| the theft of the user-password file, which is used by the central computer to |
| check any password typed in. |
|
|
| By the mid-1970s, ways of tackling this had been developed. Using so-called |
| "one-way functions", each password was encrypted in a way that cannot be |
| unscrambled. The password file then contains only apparently meaningless |
| symbols, of no obvious use to the would-be hacker. But, as Denning warns, even |
| this can be beaten if passwords are chosen sloppily. Instead of trying to |
| unscramble the file, hackers can simply feed common names and dates -- or even |
| the entire English dictionary -- through the one-way function to see if the end |
| result matches anything on the scrambled password file. Far from being a |
| theoretical risk, this technique was used during the notorious Project |
| Equalizer case in 1987, when KGB-backed hackers in Hanover broke the passwords |
| of Unix-based computers in America. |
|
|
| Ultimately, the only way to solve the password problem is to free people of |
| their fear of forgetting more complex ones. The long-term solution, says |
| Denning, probably lies with the use of smart-card technology. One option is a |
| card which generates different passwords once a minute, using a formula based |
| on the time given by an internal clock. The user then logs on using this |
| password. Only if the computer confirms that the password corresponds to the |
| log-on time is the user allowed to continue. Another smart-card technique is |
| the "challenge-response" protocol. Users first log on to their computer under |
| their name, and are then "challenged" by a number appearing on the screen. |
| Keying this into their smart card, a "response number" is generated by a |
| formula unique to each smart card. If this number corresponds to the response |
| expected from a particular user's smart card, the computer allows access. A |
| number of companies are already marketing smart-card systems, although the |
| technology has yet to become popular. |
|
|
| In the meantime, Denning says that avoiding passwords based on English words |
| would boost security. He highlights one simple technique for producing non- |
| standard words that are nonetheless easy to remember: "Pass-phrases". For |
| this, one merely invents a nonsensical phrase like "Martin says Unix gives gold |
| forever", and uses the first letter of each word to generate the password: |
| MSUGGF. Such a password will defeat hackers, even if the password file is |
| stolen, as it does not appear in any dictionary. However, Denning is wary of |
| giving any guarantees. One day, he cautions, someone may draw up a |
| computerized dictionary of common phrases. "The method will probably be good |
| for a year or two, until someone who likes to compile these dictionaries starts |
| to attack it." |
| _______________________________________________________________________________ |
|
|
| Outgunned "Computer Cops" Track High-Tech Criminals June 8, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Tony Rogers (Associated Press) |
|
|
| BOSTON -- The scam was simple. When a company ordered an airline ticket on its |
| credit card, a travel agent entered the card number into his computer and |
| ordered a few extra tickets. |
|
|
| The extra tickets added up and the unscrupulous agent sold them for thousands |
| of dollars. |
|
|
| But the thief eventually attracted attention and authorities called in Robert |
| McKenna, a prosecutor in the Suffolk County district attorney's office. He is |
| one of a growing, but still outgunned posse of investigators who track high- |
| tech villains. |
|
|
| After the thief put a ticket to Japan on a local plumbing company's account, he |
| was arrested by police McKenna had posing as temporary office workers. He was |
| convicted and sentenced to a year in prison. |
|
|
| But the sleuths who track high-tech lawbreakers say too many crimes can be |
| committed with a computer or a telephone, and too few detectives are trained to |
| stop them. |
|
|
| "What we've got is a nuclear explosion and we're running like hell to escape |
| the blast. But it's going to hit us," said Chuck Jones, who oversees high-tech |
| crime investigations at the California Department of Justice. |
|
|
| The problem is, investigators say, computers have made it easier to commit |
| crimes like bank fraud. Money transfers that once required signatures and |
| paperwork are now done by pressing a button. |
|
|
| But it takes time to train a high-tech enforcer. |
|
|
| "Few officers are adept in investigating this, and few prosecutors are adept |
| in prosecuting it," Jones said. |
|
|
| "You either have to take a cop and make him a computer expert, or take a |
| computer expert and make him a cop. I'm not sure what the right approach is." |
|
|
| In recent high-tech crimes: |
|
|
| - Volkswagen lost almost $260 million because of an insider computer scam |
| involving phony currency exchange transactions. |
|
|
| - A former insurance firm employee in Fort Worth, Texas, deleted more than |
| 160,000 records from the company's computer. |
|
|
| - A bank employee sneaked in a computer order to Brinks to deliver 44 |
| kilograms of gold to a remote site, collected it, then disappeared. |
|
|
| Still, computer cops have their successes. |
|
|
| The Secret Service broke up a scheme to make counterfeit automatic teller |
| machine cards that could have netted millions. |
|
|
| And Don Delaney, a computer detective for the New York State Police, nabbed |
| Jaime Liriano, who cracked a company's long-distance phone system. |
|
|
| Many company phone systems allow employes to call an 800 number, punch in a |
| personal identification number and then make long-distance calls at company |
| expense. |
|
|
| Some computer hackers use automatic speed dialers -- known as "demon dialers" |
| -- to dial 800 numbers repeatedly and try different four-digit numbers until |
| they crack the ID codes. Hackers using this method stole $12 million in phone |
| service from NASA. |
|
|
| Liriano did it manually, calling the 800 number of Data Products in |
| Wallingford, Connecticut, from his New York City apartment. He cracked the |
| company's code in two weeks. |
|
|
| Liriano started selling the long distance service -- $10 for a 20-minute call |
| anywhere -- and customers lined up inside his apartment. |
|
|
| But Delaney traced the calls and on March 10, he and his troopers waited |
| outside Liriano's apartment. On a signal from New York Telephone, which was |
| monitoring Liriano's line, the troopers busted in and caught him in the act. |
|
|
| Liriano pleaded guilty to a misdemeanor of theft of services, and was |
| sentenced to three years' probation and community service. |
|
|
| Data Products lost at least $35,000. "And we don't know what he made," |
| Delaney said of Liriano. |
| _______________________________________________________________________________ |
|
|
| Who Pays For Calls By Hackers? June 12, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Kent Gibbons (The Washington Times)(Page C1) |
|
|
| ICF International Inc. doesn't want to pay $82,000 for unauthorized calls by |
| hackers who tapped the company's switchboard. |
|
|
| AT&T says the Fairfax engineering firm owns the phone system and is responsible |
| for the calls, mostly to Pakistan. |
|
|
| Now their dispute and others like it are in Congress' lap. A House |
| subcommittee chairman believes a law is needed to cap the amount a company can |
| be forced to pay for fraudulent calls, the same way credit card users are |
| protected. |
|
|
| Edward Markey, the Massachusetts Democrat who held hearings on the subject |
| said long-distance carriers and local telephone companies should absorb much of |
| those charges. |
|
|
| Victims who testified said they didn't know about the illegal calls until the |
| phone companies told them, sometimes weeks after strange calling patterns |
| began. But since the calls went through privately owned switchboards before |
| entering the public telephone network, FCC rules hold the switchboard owners |
| liable. |
|
|
| "This is one of the ongoing dilemmas caused by the breakup of AT&T," Mr. Markey |
| said. Before the 1984 Bell system breakup, every stage of a call passed |
| through the American Telephone & Telegraph Co. network and AT&T was liable for |
| fraudulent calls. |
|
|
| Estimates of how much companies lose from this growing form of telephone fraud |
| range from $300 million to more than $2 billion per year. |
|
|
| The range is so vast because switchboard makers and victims often don't report |
| losses to avoid embarrassment or further fraud, said James Spurlock of the |
| Federal Communications Commission. |
|
|
| Long-distance carriers say they have stepped up their monitoring of customer |
| calls to spot unusual patterns such as repeated calls to other countries in a |
| short period. In April, Sprint Corp. added other protective measures, |
| including, for a $100 installation charge and $100 monthly fee, a fraud |
| liability cap of $25,000 per incident. |
|
|
| AT&T announced a similar plan last month. |
|
|
| Robert Fox, Sprint assistant vice president of security, said the new plans cut |
| the average fraud claim from more than $20,000 in the past to about $2,000 |
| during the first five months of this year. |
|
|
| But the Sprint and AT&T plans don't go far enough, Mr. Markey said. |
|
|
| ICF's troubles started in March 1988. At the time, the portion of ICF that was |
| hit by the fraud was an independent software firm in Rockville called Chartways |
| Technologies Inc. ICF bought Chartways in April 1991. |
|
|
| As with most cases of fraud afflicting companies with private phone systems, |
| high-tech bandits broke into the Chartways switchboard using a toll-free number |
| set up for the company's customers. |
|
|
| Probably aided by a computer that randomly dials phone numbers, the hackers |
| got through security codes to obtain a dial tone to make outside calls. |
|
|
| The hackers used a fairly common feature some companies offer out-of-town |
| employees to save on long-distance calls. Ironically, Chartways never used the |
| feature because it was too complicated, said Walter Messick, ICF's manager of |
| contract administration. |
|
|
| On March 31, AT&T officials told Chartways that 757 calls were made to Pakistan |
| recently, costing $42,935. |
|
|
| The phone bill arrived later that day and showed that the Pakistan calls had |
| begun 11 days before, Mr.Messick said. |
|
|
| Because of the Easter holiday and monitoring of calls by Secret Service agents, |
| ICF's outside-calling feature was not disconnected until April 4. By then, ICF |
| had racked up nearly $82,000 in unauthorized calls. |
|
|
| A year ago, the FCC's Common Carrier Bureau turned down ICF's request to erase |
| the charges. The full commission will hear an appeal this fall. |
| _______________________________________________________________________________ |
|
|
| Dutch Hackers Feel Data Security Law Will Breed Computer Crime July 7, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Oscar Kneppers (ComputerWorld Netherland) |
|
|
| HAARLEM, the Netherlands -- Dutch hackers will be seriously reprimanded for |
| breaking and entering computer systems, if a new law on computer crime is |
| passed in the Netherlands. |
|
|
| Discussed recently in Dutch parliament and under preparation for more than two |
| years, the proposed law calls hacking "a crime against property." It is |
| expected to be made official in next spring at the earliest and will consist of |
| the following three parts: |
|
|
| - The maximum penalty for hackers who log on to a secured computer system |
| would be six months' imprisonment. |
|
|
| - If they alter data in the system, they could spend up to four years in |
| prison. |
|
|
| - Those who illegally access a computer system that serves a "common use" -- |
| like that in a hospital or like a municipal population database -- could soon |
| risk a prison sentence of six years. |
|
|
| This pending law does not differentiate between computer crimes committed |
| internally or externally from an office. For example, cracking the password of |
| a colleague could lead to prosecution. |
|
|
| Hackers believe this law will only provoke computer crime, because the hackers |
| themselves will no longer offer "cheap warnings" to a computer system with poor |
| security. |
|
|
| Rop Gonggrijp, who is sometimes called the King of Hacking Holland, and is |
| currently editor-in-chief of Dutch computer hacker magazine "Hack-tic" warns |
| that this law could produce unexpected and unwanted results. |
|
|
| "Students who now just look around in systems not knowing that it [this |
| activity] is illegal could then suddenly end up in jail," he said. Gonggrijp |
| equates hacking to a big party, where you walk in uninvited. |
|
|
| Gonggrijp is concerned about the repercussions the new law may have on existing |
| hackers. He said he thinks the current relationship between computer hackers |
| and systems managers in companies is favorable. "[Hackers] break into, for |
| example, an E-mail system to tell the systems manager that he has to do |
| something about the security. If this law is introduced, they will be more |
| careful with that [move]. The cheap warning for failures in the system will, |
| therefore, no longer take place, and you increase chances for so-called real |
| criminals with dubious intentions," he added. |
|
|
| According to a spokesman at the Ministry of Justice in The Hague, the law gives |
| the Dutch police and justice system a legal hold on hackers that they currently |
| lack. |
|
|
| "Computer criminals [now] have to be prosecuted via subtle legal tricks and |
| roundabout routes. A lot of legal creativity was [previously] needed. But |
| when this law is introduced, arresting the hackers will be much easier," he |
| said. |
|
|
| The Dutch intelligence agency Centrale Recherche Informatiedienst (CRI) in The |
| Hague agreed with this. Ernst Moeskes, CRI spokesman, said, "It's good to see |
| that we can handle computer crime in a directed way now." |
| _______________________________________________________________________________ |
|
|
| PWN Quicknotes |
| ~~~~~~~~~~~~~~ |
| 1. Printer Avoids Jail In Anti-Hacking Trial (By Melvyn Howe, Press |
| Association Newsfile, June 9, 1992) -- A printer avoided a jail sentence |
| in Britain's first trial under anti-hacking legislation. Freelance |
| typesetter Richard Goulden helped put his employers out of business with a |
| pirate computer program -- because he said they owed him L2,275 in back |
| pay. Goulden, 35, of Colham Avenue, Yiewsley, west London, was |
| conditionally discharged for two years after changing his plea to guilty on |
| the second day of the Southwark Crown Court hearing. He was ordered to pay |
| L1,200 prosecution costs and L1,250 compensation to the company's |
| liquidators. Goulden had originally denied the charge of unauthorized |
| modification of computer material under the 1990 Computer Misuse Act. |
| After his change of plea Judge John Hunter told him: "I think it was plain |
| at a very early stage of these proceedings that you had no defence to this |
| allegation." Mr. Warwick McKinnon, prosecuting, told the jury Goulden added |
| a program to a computer belonging to Ampersand Typesetters, of Camden, |
| north-west London, in June last year which prevented the retrieval of |
| information without a special password. Three months later the company |
| "folded". Mr Jonathan Seitler, defending, said Goulden had changed his |
| plea after realizing he had inadvertently broken the law. |
| _______________________________________________________________________________ |
|
|
| 2. ICL & GM Hughes In Joint Venture To Combat Computer Hackers (Extel Examiner, |
| June 15, 1992) -- General Motors Corporation unit, Hughes STX, and ICL have |
| set up a joint venture operation offering ways of combating computer |
| hackers. Hughes STX is part of GM's GM Hughes Electronics Corporation |
| subsidiary. ICL is 80% owned by Fujitsu. Industry sources say the venture |
| could reach $100 million in annual sales within four years. |
| _______________________________________________________________________________ |
|
|
| 3. Another Cornell Indictment (Ithaca Journal, June 17, 1992) -- Mark Pilgrim, |
| David Blumenthal, and Randall Swanson -- all Cornell students -- have each |
| been charged with 4 felony counts of first-degree computer tampering, 1 |
| count of second-degree computer tampering, and 7 counts of second-degree |
| attempted computer tampering in connection with the release of the MBDF |
| virus to the Internet and to various BBSs. |
|
|
| David Blumenthal has also been charged with two counts of second-degree |
| forgery and two counts of first-degree falsifying business records in |
| connection with unauthorized account creation on Cornell's VAX5 system. He |
| was also charged with a further count of second-degree computer tampering |
| in connection with an incident that occurred in December of 1991. |
| _______________________________________________________________________________ |
|
|
| 4. Computer Watchdogs Lead Troopers To Hacker (PR Newswire, July 17, 1992) -- |
| Olympia, Washington -- State Patrol detectives served a search warrant at an |
| East Olympia residence Thursday evening, July 16, and confiscated a personal |
| computer system, programs and records, the Washington State Patrol said. |
|
|
| The resident, who was not on the premises when the warrant was served, is |
| suspected of attempts to break into computer files at the Department of |
| Licensing and the State Insurance Commissioner's office. |
|
|
| The "hacker's" attempts triggered computerized security devices which |
| alerted officials someone was attempting to gain access using a telephone |
| modem. Patrol detectives and computer staff monitored the suspect's |
| repeated attempts for several weeks prior to service of the warrant. |
|
|
| Placement of a telephone call by a non-recognized computer was all that was |
| required to trigger the security alert. The internal security system then |
| stored all attempted input by the unauthorized user for later retrieval and |
| use by law enforcement. Integrity of the state systems was not breached. |
|
|
| The investigation is continuing to determine if several acquaintances may be |
| linked to the break in. Charges are expected to be filed as early as next |
| week in the case. |
|
|
| CONTACT: Sgt. Ron Knapp of the Washington State Patrol, (206)459-6413 |
| _______________________________________________________________________________ |
|
|
| 5. UPI reports that the 313 NPA will split to a new 810 NPA effective |
| August 10, 1994. |
|
|
| Oakland, Macomb, Genesee, Lapeer, St. Clair and Sanilac counties as well as |
| small sections of Saginaw, Shiawassee and Livingston counties will go into |
| 810. Wayne, Washtenaw, Monroe, and small parts of Jackson and Lenawee |
| counties will remain in 313. The city of Detroit is in Wayne County and |
| won't change. |
| _______________________________________________________________________________ |
|
|