| ==Phrack Inc.== |
|
|
| Volume Four, Issue Forty-One, File 11 of 13 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Issue 41 / Part 1 of 3 PWN |
| PWN PWN |
| PWN Compiled by Datastream Cowboy PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| Reports of "Raid" on 2600 Washington Meeting November 9, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Barbara E. McMullen & John F. McMullen (Newsbytes) |
|
|
| WASHINGTON, D.C. -- The publisher of a well-known hacker magazine claims a |
| recent meeting attended by those interested in the issues his magazine raises |
| was disrupted by threats of arrest by security and Arlington, Virginia police |
| officers. |
|
|
| Eric Corley, also known as "Emmanuel Goldstein," editor and publisher of "2600 |
| Magazine: The Hacker Quarterly," told Newsbytes that the meeting was held |
| November 6th at the Pentagon City Mall outside Washington, DC was disrupted and |
| material was confiscated in the raid. |
|
|
| 2600 Magazine promotes monthly meetings of hackers, press, and other interested |
| parties throughout the country. The meetings are held in public locations on |
| the first Friday evening of the month and the groups often contact each other |
| by telephone during the meetings. |
|
|
| Corley told Newsbytes that meetings were held that evening in New York, |
| Washington, Philadelphia, Cambridge, St. Louis, Chicago, Los Angeles and San |
| Francisco. Corley said, "While I am sure that meetings have been observed by |
| law enforcement agencies, this is the only time that we have been harassed. It |
| is definitely a freedom of speech issue." |
|
|
| According to Craig Neidorf, who was present at the meeting and was distributing |
| applications for membership in Computer Professionals For Social Responsibility |
| (CPSR), "I saw the security officers focusing on us. Then they started to come |
| toward us from a number of directions under what seemed to be the direction of |
| a person with a walkie-talkie on a balcony. When they approached, I left the |
| group and observed the security personnel encircling the group of about 30 |
| gatherers. The group was mainly composed of high school and college students. |
| The guards demanded to search the knapsacks and bags of the gatherers. They |
| confiscated material, including CPSR applications, a copy of Mondo 2000 (a |
| magazine), and other material." |
|
|
| He adds that the guards also confiscated film "from a person trying to take |
| pictures of the guards. When a hacker called "HackRat" attempted to copy down |
| the names of the guards, they took his pencil and paper." |
|
|
| Neidorf continued, "I left to go outside and rejoined the group when they were |
| ejected from the mall. The guards continued challenging the group and told |
| them that they would be arrested if they returned. When one of the people |
| began to take pictures of the guards, the apparent supervisor became excited |
| and threatening but did not confiscate the film." |
|
|
| Neidorf also said, "I think that the raid was planned. They hit right about |
| 6:00 and they identified our group as "hackers" and said that they knew that |
| this group met every month." |
|
|
| Neidorf's story was supported by a Washington "hacker" called "Inhuman," who |
| told Newsbytes, "I arrived at the meeting late and saw the group being detained |
| by the guards. I walked along with the group as they were being ushered out |
| and when I asked a person who seemed to be in authority his name, he pointed at |
| a badge with his name written in script on it. I couldn't make out the name |
| and, when I mentioned that to the person, he said 'If you can't read it, too |
| bad.' I did read his name, 'C. Thomas,' from another badge." |
|
|
| Inhuman also told Newsbytes that he was told by a number of people that the |
| guards said that they were "acting on behalf of the Secret Service." He added, |
| "I was also told that there were two police officers from the Arlington County |
| Police present but I did not see them." |
|
|
| Another attendee, Doug Luce, reports, "I also got to the DC meeting very late; |
| 7:45 or so. It seemed like a coordinated harassment episode, not geared toward |
| busting anyone, but designed to get people riled up, and maybe not come back to |
| the mall." |
|
|
| Luce adds that he overheard a conversation between someone who had brought a |
| keyboard to sell. The person, he said, was harassed by security forces, one of |
| whom said, "You aren't selling anything in my mall without a vendors permit!" |
|
|
| Possible Secret Service involvement was supported by a 19 year-old college |
| student known as the "Lithium Bandit," who told Newsbytes, "I got to the mall |
| about 6:15 and saw the group being detained by approximately 5 Arlington County |
| police and 5 security guards. When I walked over to see what was going on, a |
| security guard asked me for an ID and I refused to show it, saying that I was |
| about to leave. The guard said that I couldn't leave and told me that I had to |
| see a police officer. When I did, the officer demanded ID and, when I once |
| again refused, he informed me that I could be detained for up to 10 hours for |
| refusing to produce identification. I gave in and produced my school ID which |
| the police gave to the security people who copied down my name and social |
| security number." |
|
|
| Lithium Bandit continued, "When I asked the police what was behind this action, |
| I was told that they couldn't answer but that 'the Secret Service is involved |
| and we are within our rights doing this." |
|
|
| The boy says he and others later went to the Arlington police station to get |
| more information and were told only that there was a report of the use of a |
| stolen credit card and two officers were sent to investigate. "They later |
| admitted that it was 5 (officers). While I was detained, I heard no mention of |
| a credit card and there was no one arrested." |
| Marc Rotenberg, director of CPSR's Washington office, told Newsbytes, "I have |
| really no details on the incident yet, but I am very concerned about the |
| reports. Confiscation of CPSR applications, if true, is outrageous. I will |
| find out more facts on Monday." |
|
|
| Newsbytes was told by the Pentagon City Mall office that any information |
| concerning the action would have to come from the director of security, Al |
| Johnson, who was not available until Monday. The Arlington Country Police |
| referred Newsbytes to a "press briefing recording" which had not been updated |
| since the morning before the incident. |
|
|
| Corley told Newsbytes, "There have been no reports of misbehavior by any of |
| these people. They were obviously singled out because they were hackers. It's |
| as if they were being singled out as an ethnic group. I admire the way the |
| group responded -- in a courteous fashion. But it is inexcusable that it |
| happened. I will be at the next Washington meeting to insure that it doesn't |
| happen again." |
|
|
| The manager of one of New York state's largest malls provided background |
| information to Newsbytes on the rights of malls to police those on mall |
| property, saying, "The primary purpose of a mall is to sell. The interior of |
| the mall is private property and is subject to the regulations of the mall. |
| The only requirement is that the regulations be enforced in an even-handed |
| manner. I do not allow political activities in my mall so I could not make an |
| exception for Democrats. We do allow community groups to meet but they must |
| request space at least two weeks before the meeting and must have proper |
| insurance. Our regulations also say that groups of more than 4 may not |
| congregate in the mall." |
|
|
| The spokeswoman added that mall security can ask for identification from those |
| who violate regulations and that they may be barred from the mall for a period |
| of 6 months. |
|
|
| She added, "Some people feel that mall atriums and food courts are public |
| space. They are not and the industry is united on this. If the malls were to |
| receive tax benefits for the common space and public service in snow removal |
| and the like, it could possibly be a public area but malls are taxed on the |
| entire space and are totally private property, subject to their own |
| regulations. If a group of 20 or more congregated in my mall, they would be |
| asked to leave." |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Confusion About Secret Service Role In 2600 Washington Raid November 7, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Barbara E. McMullen & John F. McMullen (Newsbytes) |
|
|
| WASHINGTON, D.C.-- In the aftermath of an action on Friday, November 6th by |
| members of the Pentagon City Mall Police and police from Arlington County, |
| Virginia in which those attending a 2600 meeting at the mall were ordered from |
| the premises, conflicting stories continue to appear. |
|
|
| Attendees at the meeting have contended to Newsbytes that members of the mall |
| police told them that they were "acting on behalf of the Secret Service." They |
| also maintain that the mall police confiscated material from knapsacks and took |
| film from someone attempting to photograph the action and a list of the names |
| of security officers that one attendee was attempting to compile. |
|
|
| Al Johnson, chief of security for the mall, denied these allegations to |
| Newsbytes, saying "No one said that we were acting on behalf of the Secret |
| Service. We were merely enforcing our regulations. While the group was not |
| disruptive, it had pulled tables together and was having a meeting in our food |
| court area. The food court is for people eating and is not for meetings. We |
| therefore asked the people to leave." |
|
|
| Johnson denied that security personnel took away any film or lists and further |
| said "We did not confiscate any material. The group refused to own up to who |
| owned material on the tables and in the vicinity so we collected it as lost |
| material. If it turns out that anything did belong to any of those people, |
| they are welcome to come in and, after making proper identification, take the |
| material." |
|
|
| In a conversation early on November 9th, Robert Rasor, Secret Service agent-in- |
| charge of computer crime investigations, told Newsbytes that having mall |
| security forces represent the Secret Service is not something that was done |
| and, that to his knowledge, the Secret Service had no involvement with any |
| Pentagon City mall actions on the previous Friday. |
|
|
| A Newsbytes call to the Arlington County police was returned by a Detective |
| Nuneville who said that her instructions were to refer all questions concerning |
| the matter to agent David Adams of the Secret Service. She told Newsbytes that |
| Adams would be providing all information concerning the involvement of both the |
| Arlington Police and the Secret Service in the incident. |
|
|
| Adams told Newsbytes "The mall police were not acting as agents for the Secret |
| Service. Beyond that, I can not confirm or deny that there is an ongoing |
| investigation." |
|
|
| Adams also told Newsbytes that "While I cannot speak for the Arlington police, |
| I understand that their involvement was due to an incident unrelated to the |
| investigation." |
|
|
| Marc Rotenberg, director of the Washington office of Computer Professionals for |
| Social Responsibility (CPSR), told Newsbytes "CPSR has reason to believe that |
| the detention of people at the Pentagon City Mall last Friday was undertaken at |
| the behest of the Secret Service, which is a federal agency. If that is the |
| case, then there was an illegal search of people at the mall. There was no |
| warrant and no indication of probable illegal activity. This raises |
| constitutional issues. We have undertaken the filing of a Freedom of |
| Information Act (FOIA) request to determine the scope, involvement and purpose |
| of the Secret Service in this action." |
|
|
| 2600 meetings are held on the evening of the first Friday of each month in |
| public places and malls in New York City, Washington, Philadelphia, Cambridge, |
| St. Louis, Chicago, Los Angeles and San Francisco. They are promoted by 2600 |
| Magazine: The Hacker Quarterly and are attended by a variety of persons |
| interested in telecommunications and so-called "hacker issues". The New York |
| meeting, the oldest of its kind, is regularly attended by Eric Corley a/k/a |
| Emmanuel Goldstein, editor and publisher of 2600, hackers, journalists, |
| corporate communications professionals and other interested parties. It is |
| known to have been the subject of surveillance at various times by law |
| enforcement agencies conducting investigations into allegations of computer |
| crime. |
|
|
| Corley told Newsbytes "While I'm sure that meetings have been observed by law |
| enforcement agencies, this is the only time that we have been harassed. It's |
| definitely a freedom of speech issue." Corley also that he plans to be at the |
| December meeting in Washington "to insure that it doesn't happen again." |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Conflicting Stories In 2600 Raid; CRSR Files FOIA November 11, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Barbara E. McMullen & John F. McMullen (Newsbytes) |
|
|
| WASHINGTON, D.C. -- In the on-going investigation of possible Secret Service |
| involvement in the Friday, November 6th ejection of attendees at a "2600 |
| meeting" from the premises of the Pentagon City Mall, diametrically opposed |
| statements have come from the same source. |
|
|
| Al Johnson, chief of security for the Pentagon City Mall told Newsbytes on |
| Monday, November 9th "No one said that we were acting on behalf of the Secret |
| Service. We were merely enforcing our regulations. While the group was not |
| disruptive, it had pulled tables together and was having a meeting in our food |
| court area. The food court is for people eating and is not for meetings. We |
| therefore asked the people to leave." |
|
|
| On the same day, Johnson was quoted was quoted in a Communications Daily |
| article by Brock Meeks as saying "As far as I'm concerned, we're out of this. |
| The Secret Service, the FBI, they're the ones that ramrodded this whole thing." |
|
|
| Newsbytes contacted Meeks to discuss the discrepancies in the stories and were |
| informed that the conversation with Johnson had been taped and was available |
| for review. The Newsbytes reporter listened to the tape (and reviewed a |
| transcript). On the tape, Johnson was clearly heard to make the statement |
| quoted by Meeks. |
|
|
| He also said "maybe you outta call the Secret Service, they're handling this |
| whole thing. We, we were just here", and, in response to a Meeks question |
| about a Secret Service contact, "Ah.. you know, I don't have a contact person. |
| These people were working on their own, undercover, we never got any names, but |
| they definitely, we saw identification, they were here." |
|
|
| Newsbytes contacted Johnson again on the morning of Wednesday, November 11 and |
| asked him once again whether there was any Secret Service involvement in the |
| action. Johnson said "No, I told you that they were not involved." When it was |
| mentioned that there was a story in Communications Daily, quoting him to the |
| contrary, Johnson said "I never told Meeks that. There was no Secret Service |
| involvement" |
|
|
| Informed of the possible existence of a tape quoting him to the contrary. |
| Johnson said "Meeks taped me? He can't do that. I'll show him that I'm not |
| fooling around. I'll have him arrested." |
|
|
| Johnson also said "He asked me if the Secret Service was involved; I just told |
| him that, if he thought they were, he should call them and ask them." |
|
|
| Then Johnson again told Newsbytes that the incident was "just a mall problem. |
| There were too many people congregating." |
|
|
| [NOTE: Newsbytes stands by its accurate reporting of Johnson's statements. It |
| also affirms that the story by Meeks accurately reflects the material taped |
| during his interview] |
|
|
| In a related matter, Marc Rotenberg, director of the Washington office of |
| Computer Professionals For Social Responsibility (CPSR) has announced that CPSR |
| has filed a Freedom of Information Act (FOIA) request with the Secret Service |
| asking for information concerning Secret Service involvement in the incident. |
|
|
| Rotenberg told Newsbytes that the Secret Service has 10 days to respond to the |
| request. He also said that CPSR "is exploring other legal options in this |
| matter." |
|
|
| The Secret Service, in earlier conversations with Newsbytes, has denied that |
| the mall security was working on its behalf. |
|
|
| In the incident itself, a group attending the informal meeting was disbanded |
| and, according to attendees, had property confiscated. They also contend that |
| security guards took film from someone photographing the confiscation as well |
| as a list that someone was making of the guard's names. In his November 9th |
| conversation with Newsbytes, Johnson denied that security personnel took away |
| any film or lists and further said "We did not confiscate any material. The |
| group refused to own up to who owned material on the tables and in the vicinity |
| so we collected it as lost material. If it turns out that anything did belong |
| to any of those people, they are welcome to come in and, after making proper |
| identification, take the material." |
|
|
| 2600 meetings are promoted by 2600 Magazine: The Hacker Quarterly and are held |
| on the evening of the first Friday of each month in public places and malls in |
| New York City, Washington, Philadelphia, Cambridge, St. Louis, Chicago, Los |
| Angeles and San Francisco. They are regularly attended by a variety of persons |
| interested in telecommunications and so-called "hacker issues". |
| _______________________________________________________________________________ |
|
|
| Secret Service Grabs Computers In College Raid December 17, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Joe Abernathy (The Houston Chronicle)(Page A37) |
|
|
| The Secret Service has raided a dorm room at Texas Tech University, seizing the |
| computers of two Houston-area students who allegedly used an international |
| computer network to steal computer software. |
|
|
| Agents refused to release the names of the two area men and a third man, a |
| former Tech student from Austin, who were not arrested in the late-morning raid |
| Monday at the university in Lubbock. Their cases will be presented to a grand |
| jury in January. |
|
|
| The three, in their early 20s, are expected to be charged with computer crime, |
| interstate transport of stolen property and copyright infringements. |
|
|
| "The university detected it," said Agent R. David Freriks of the Secret Service |
| office in Dallas, which handled the case. He said Texas Tech computer system |
| operators noticed personal credit information mixed in with the software |
| mysteriously filling up their data storage devices. |
|
|
| The former student admitted pirating at least $6,000 worth of games and |
| programs this summer, Freriks said. |
|
|
| The raid is the first to fall under a much broader felony definition of |
| computer software piracy that could affect many Americans. |
|
|
| Agents allege the three used the Internet computer network, which connects up |
| to 15 million people in more than 40 nations, to make contacts with whom they |
| could trade pirated software. The software was transferred over the network, |
| into Texas Tech's computers and eventually into their personal computers. |
|
|
| The Software Publishers Association, a software industry group chartered to |
| fight piracy, contends the industry lost $1.2 billion in sales in 1991 to |
| pirates. |
|
|
| Although these figures are widely questioned for their accuracy, piracy is |
| widespread among Houston's 450-plus computer bulletin boards, and even more so |
| on the global Internet. |
|
|
| "There are a lot of underground sites on the Internet run by university system |
| administrators, and they have tons of pirated software available to download -- |
| gigabytes of software," said Scott Chasin, a former computer hacker who is now |
| a computer security consultant. |
|
|
| Freriks said the investigation falls under a revision of the copyright laws |
| that allows felony charges to be brought against anyone who trades more than 10 |
| pieces of copyrighted software -- a threshold that would cover many millions of |
| Americans who may trade copies of computer programs with their friends. |
|
|
| "The ink is barely dry on the amendment, and you've already got law enforcement |
| in there, guns blazing, because somebody's got a dozen copies of stolen |
| software," said Marc Rotenberg, director of Computer Professionals for Social |
| Responsibility, in Washington. |
|
|
| "That was a bad provision when it was passed, and was considered bad for |
| precisely this reason, giving a justification for over-reaching by law |
| enforcement." |
|
|
| Freriks said the raid also involved one of the first uses of an expanded right |
| to confiscate computers used in crime. |
|
|
| "Our biggest complaint has been that you catch 'em and slap 'em on the wrist, |
| and then give the smoking gun back," he said. |
|
|
| "So they've changed the law so that we now have forfeiture authority." |
|
|
| The Secret Service already has been under fire for what is seen by civil |
| libertarians as an overly casual use of such authority, which many believe has |
| mutated from an investigative tool into a de facto punishment without adequate |
| court supervision. |
|
|
| _______________________________________________________________________________ |
|
|
| Hacker Taps Into Freeway Call Box -- 11,733 Times October 23, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Jeffrey A. Perlman (Los Angeles Times)(Page A3) |
|
|
| SANTA ANA, CA -- An enterprising hacker reached out and touched someone 11,733 |
| times in August -- from a freeway emergency call box in Orange County. |
|
|
| A computer that monitors the county's emergency call boxes attributed 25,875 |
| minutes of calls to the mysterious caller who telephoned people in countries |
| across the globe, according to a staff report prepared for the Orange County |
| Transportation Authority. |
|
|
| "This is well over the average of roughly 10 calls per call box," the report |
| noted. |
|
|
| About 1,150 bright yellow call boxes have been placed along Orange County's |
| freeways to connect stranded motorists to the California Highway Patrol. But |
| the caller charged all his calls to a single box on the shoulder of the Orange |
| (57) Freeway. |
|
|
| The hacker apparently matched the individual electronic serial number for the |
| call box to its telephone number. It took an investigation by the transit |
| authority, and three cellular communications firms to unravel the mystery, the |
| report stated. |
|
|
| Officials with the transit authority's emergency call box program were not |
| available to comment on the cost of the phone calls or to say how they would be |
| paid. |
|
|
| But the report assured that "action has been taken to correct this problem. It |
| should be noted that this is the first incident of this type in the five-year |
| history of the program." |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Ring May Be Responsible For Freeway Call Box Scam October 24, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Jodi Wilgoren (Los Angeles Times)(Page B4) |
|
|
| "Officials Believe A Hacker Sold Information to Others; |
| LA Cellular Will Pay For The Excess Calls." |
|
|
| COSTA MESA, CA -- As soon as he saw the August bill for Orange County's freeway |
| call boxes, analyst Dana McClure guessed something was awry. |
|
|
| There are typically about 12,000 calls a month from the 1,150 yellow boxes that |
| dot the county's freeways. But in August, there were nearly that many |
| registered to a single box on the Orange Freeway a half-mile north of Lambert |
| Road in Brea. |
|
|
| "This one stood out, like 'Whoa!'" said McClure, who analyzes the monthly |
| computer billing tapes for the Orange County Transportation Authority. "It |
| kicked out as an error because the number of minutes was so far over what it is |
| supposed to be." |
|
|
| With help from experts at LA Cellular, which provides the telephone service for |
| the boxes, and GTE Cellular, which maintains the phones, McClure and OCTA |
| officials determined that the calls -- 11,733 of them totaling 25,875 minutes |
| for a charge of about $1,600 -- were made because the hacker learned the code |
| and telephone number for the call boxes. |
|
|
| Because of the number of calls in just one month's time, officials believe |
| there are many culprits, perhaps a ring of people who bought the numbers from |
| the person who cracked the system. |
|
|
| You'd have to talk day and night for 17 or 18 days to do that; it'd be |
| fantastic to be able to make that many calls," said Lee Johnson of GTE |
| Cellular. |
|
|
| As with all cases in which customers prove they did not make the calls on their |
| bills, LA Cellular will pick up the tab, company spokeswoman Gail Pomerantz |
| said. Despite the amount of time involved, the bill was only $1,600, according |
| to OCTA spokeswoman Elaine Beno, because the county gets a special emergency |
| service rate for the call box lines. |
|
|
| The OCTA will not spend time and money investigating who made the calls; |
| however, it has adjusted the system to prevent further fraud. Jim Goode of LA |
| Cellular said such abuses are rare among cellular subscribers, and that such |
| have never before been tracked to freeway call boxes. |
|
|
| The call boxes contain solar cellular phones programmed to dial directly to the |
| California Highway Patrol or a to a GTE Cellular maintenance line. The calls |
| on the August bill included 800 numbers and 411 information calls and hundreds |
| of calls to financial firms in New York, Chicago and Los Angeles. That calls |
| were placed to these outside lines indicates that the intruders made the |
| connections from another cellular phone rather than from the call box itself. |
| Each cellular phone is assigned a seven-digit Mobile Identification Number that |
| functions like a phone number, and a 10- or 11-digit Electronic Service Number |
| unique to that particular phone (similar to the vehicle identification number |
| assigned every automobile). By reprogramming another cellular phone with the |
| MIN and ESN of the call box phone, a hacker could charge all sorts of calls to |
| the OCTA. |
|
|
| "That's not legally allowable, and it's not an easy thing to do," McClure said, |
| explaining that the numbers are kept secret and that reprogramming a cellular |
| phone could wreck it. "Most people don't know how to do that, but there are |
| some." |
|
|
| Everyone involved with the call box system is confident that the problem has |
| been solved, but officials are mum as to how they blocked potential cellular |
| banditry. |
|
|
| "I don't think we can tell you what we did to fix it because we don't want it |
| to happen again," Beno said with a laugh. |
| _______________________________________________________________________________ |
|
|
| FBI Probes Possible Boeing Computer Hacker November 6, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Taken from Reuters |
|
|
| SEATTLE -- Federal authorities said Friday they were investigating the |
| possibility that a hacker had breached security and invaded a Unix-based |
| computer system at the aerospace giant Boeing Co. |
|
|
| The Federal Bureau of Investigation confirmed the probe after a Seattle radio |
| station reported it received a facsimile of a Boeing memorandum warning |
| employees the security of one of its computer networks may have been violated. |
|
|
| The memo, which had been sent from inside Boeing, said passwords may have been |
| compromised, a reporter for the KIRO station told Reuters. |
|
|
| KIRO declined to release a copy of the memorandum or to further identify its |
| source. |
|
|
| The memorandum said the problem involved computers using Unix, the open-ended |
| operating system used often in engineering work. |
|
|
| Sherry Nebel, a spokeswoman at Boeing's corporate headquarters, declined |
| comment on the memorandum or the alleged breach of security and referred all |
| calls to the FBI. |
|
|
| An FBI spokesman said the agency was in touch with the company and would |
| discuss with it possible breaches of federal law. |
|
|
| No information was immediately available on what type of computer systems may |
| have been violated at Boeing, the world's largest commercial aircraft |
| manufacturer. |
|
|
| The company, in addition, acts as a defense contractor and its business |
| includes work on the B-2 stealth bomber, NASA's space station and the "Star |
| Wars" project. |
|
|
| Boeing is a major user of computer technology and runs a computer services |
| group valued at $1 billion. |
|
|
| Much of the company's engineering work is conducted using computer -aided |
| design (CAD) capabilities. Boeing currently is pioneering a computerized |
| technique which uses 2,000 computer terminals to design its new 777 twinjet. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| FBI Expands Boeing Computer Hacker Probe November 9, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Samuel Perry (Reuters) |
|
|
| SEATTLE -- Federal authorities expanded their investigation of a computer |
| hacker or hackers suspected of having invaded a computer system at aerospace |
| giant and defense contractor Boeing Co. |
|
|
| FBI spokesman Dave Hill said the investigation was expanded after the agency |
| discovered similar infiltrations of computer records belonging to the U.S. |
| District Court in Seattle and another government agency. |
|
|
| "We're trying to determine if the same individuals are involved here," he said, |
| adding more than one suspect may be involved and the purpose of the intrusion |
| was unclear. |
|
|
| "We don't think this was an espionage case," Hill said, adding federal agents |
| were looking into violations of U.S. law barring breaking into a computer of |
| federal interest, but that no government classified data was believed to be |
| compromised. |
|
|
| "I'm not sure what their motivation is," he told Reuters. |
|
|
| The FBI confirmed the investigation after a Seattle radio station reported it |
| received a facsimile of a Boeing memorandum warning employees that the security |
| of one of its computer networks may have been violated. |
|
|
| A news reporter at KIRO Radio, which declined to release the facsimile, said |
| it was sent by someone within Boeing and that it said many passwords may have |
| been compromised. |
|
|
| Boeing's corporate headquarters has declined to comment on the matter, |
| referring all calls to the FBI. |
|
|
| The huge aerospace company, which is the world's largest maker of commercial |
| jetliners, relies heavily on computer processing to design and manufacture its |
| products. Its data processing arm operates $1.6 billion of computer equipment. |
|
|
| No information was disclosed on what system at Boeing had been compromised. |
| But one computer industry official said it could include "applications |
| involving some competitive situations in the aerospace industry. |
|
|
| The company is a defense contractor or subcontractor on major U.S. military |
| programs, such as the B-2 stealth bomber, the advanced tactical fighter, |
| helicopters, the NASA space station and the "Star Wars" missile defense system. |
|
|
| Recently, Boeing has pioneered the unprecedented use of computer-aided design |
| capabilities in engineering its new 777 twinjet. The design of the 777 is now |
| mostly complete as Boeing prepares for final assembly beginning next year. |
|
|
| That system, which uses three-dimensional graphics to replace a draftsman's |
| pencil and paper, includes 2,000 terminals that can tap into data from around |
| the world. |
| _______________________________________________________________________________ |
|
|
| Hacker Breaches NOAA Net August 3, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Kevin Power (Government Computer News)(Page 10) |
|
|
| As a recent breach of the National Oceanic and Atmospheric Administration's |
| (NOAA) link to the Internet shows, the network not only benefits scientists but |
| also attracts unwanted attention from hackers. |
|
|
| NOAA officials said an intruder in May accessed the agency's TCP/IP network, |
| seeking to obtain access to the Internet. The breach occurred on the National |
| Weather Service headquarters' dial-in communications server in Silver Spring, |
| Maryland, said Harold Whitt, a senior telecommunications engineer with NOAA. |
|
|
| Cygnus Support, a Palo Alto, California, software company, alerted NOAA |
| officials to the local area network security breach when Cygnus found that an |
| outsider had accessed one of its servers from the NOAA modem pool and had |
| attempted several long-distance phone calls. |
|
|
| NOAA and Cygnus officials concluded that the perpetrator was searching for an |
| Internet host, possibly to locate a games publisher, Whitt said. Fortunately, |
| the hacker did no damage to NOAA's data files, he said. |
|
|
| Whitt said intruders using a modem pool to tap into external networks are |
| always a security concern. But organizations with Internet access seem to be |
| hacker favorites, he said. "There's a lot of need for Internet security," |
| Whitt said. |
|
|
| "You have to make sure you monitor the usage of the TCP/IP network and the |
| administration of the local host. It's a common problem, but in our case we're |
| more vulnerable because of tremendous Internet access," Whitt said. |
|
|
| Whitt said NOAA's first response was to terminate all dial-in services |
| temporarily and change all the numbers. |
|
|
| Whitt said he also considered installing a caller-identification device for the |
| new lines. But the phone companies have limited capabilities to investigate |
| random incidents, he said. |
|
|
| "It's very difficult to isolate problems at the protocol level," Whitt said. |
| "We targeted the calls geographically to the Midwest. |
|
|
| "But once you get into the Internet and have an understanding of TCP/IP, you |
| can just about go anywhere," Whitt said. |
|
|
| NOAA, a Commerce Department agency, has since instituted stronger password |
| controls and installed a commercial dial-back security system, Defender from |
| Digital Pathways Inc. of Mountain View, California. |
|
|
| Whitt said the new system requires users to undergo password validation at dial |
| time and calls back users to synchronize modems and log calls. Despite these |
| corrective measures, Reed Phillips, Commerce's IRM director, said the NOAA |
| incident underlies the axiom that networks always should be considered |
| insecure. |
|
|
| At the recent annual conference of the Federation of Government Information |
| Processing Councils in New Orleans, Phillips said the government is struggling |
| to transmit more information electronically and still maintain control over the |
| data. |
|
|
| Phillips said agencies are plagued by user complacency, a lack of |
| organizational control, viruses, LAN failures and increasing demands for |
| electronic commerce. "I'm amazed that there are managers who believe their |
| electronic-mail systems are secure," Phillps said. "We provide a great deal of |
| security, but it can be interrupted. |
|
|
| "Security always gets hits hard in the budget. But the good news is vendors |
| recognize our needs and are coming out with cheaper security tools," Phillips |
| said. |
|
|
| Phillips said the NOAA attack shows that agencies must safeguard a network's |
| physical points because LANs present more security problems than centralized |
| systems. |
|
|
| "The perpetrator can dial in via a modem using the common services provided by |
| the telephone company, and the perpetrator risks no personal physical harm. By |
| gaining access to a single system on the network the perpetrator is then able |
| to propagate his access rights to multiple systems on the network," Phillips |
| said. |
|
|
| "In many LAN environments a user need only log on the network once and all |
| subsequent access is assumed to be authorized for the entire LAN. It then |
| becomes virtually impossible for a network manager or security manager to track |
| events of a perpetrator," he said. |
| _______________________________________________________________________________ |
|
|
| Hackers Scan Airwaves For Conversations August 17, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Mark Lewyn (The Washington Post)(Page A1) |
|
|
| "Eavesdroppers Tap Into Private Calls." |
|
|
| On the first day of the Soviet coup against Mikhail Gorbachev in August 1991, |
| Vice President Quayle placed a call to Senator John C. Danforth (R-Mo.) and |
| assessed the tense, unfolding drama. |
|
|
| It turned out not to be a private conversation. |
|
|
| At the time, Quayle was aboard a government jet, flying to Washington from |
| California. As he passed over Amarillo, Texas his conversation, transmitted |
| from the plane to Danforth's phone, was picked up by an eavesdropper using |
| electronic "scanning" gear that searches the airwaves for radio or wireless |
| telephone transmissions and then locks onto them. |
|
|
| The conversation contained no state secrets -- the vice president observed that |
| Gorbachev was all but irrelevant and Boris Yeltsin had become the man to watch. |
| But it remains a prized catch among the many conversations overhead over many |
| years by one of a steadily growing fraternity of amateur electronics |
| eavesdroppers who listen in on all sorts of over-the-air transmissions, ranging |
| from Air Force One communications to cordless car-phone talk. |
|
|
| One such snoop overheard a March 1990 call placed by Peter Lynch, a well-known |
| mutual fund executive in Boston, discussing his forthcoming resignation, an |
| event that later startled financial circles. Another electronic listener |
| overheard the chairman of Popeye's Fried Chicken disclose plans for a 1988 |
| takeover bid for rival Church's Fried Chicken. |
|
|
| Calls by President Bush and a number of Cabinet officers have been intercepted. |
| The recordings of car-phone calls made by Virginia Governor L. Douglas Wilder |
| (D), intercepted by a Virginia Beach restaurant owner and shared with Senator |
| Charles S. Robb (D-Va.), became a cause ce'le'bre in Virginia politics. |
|
|
| Any uncoded call that travels via airwaves, rather than wire, can be picked up, |
| thus the possibilities have multiplied steadily with the growth of cellular |
| phones in cars and cordless phones in homes and offices. About 41 percent of |
| U.S. households have cordless phones and the number is expected to grow by |
| nearly 16 million this year, according to the Washington-based Electronics |
| Industry Association. |
|
|
| There are 7.5 million cellular phone subscribers, a technology that passes |
| phone calls over the air through a city from one transmission "cell" to the |
| next. About 1,500 commercial airliners now have air-to-ground phones -- roughly |
| half the U.S. fleet. |
|
|
| So fast-growing is this new form of electronic hacking that it has its own |
| magazines, such as Monitoring Times. "The bulk of the people doing this aren't |
| doing it maliciously," said the magazine's editor, Robert Grove, who said he |
| has been questioned several times by federal agents, curious about hackers' |
| monitoring activities. |
|
|
| But some experts fear the potential for mischief. The threat to business from |
| electronic eavesdropping is "substantial," said Thomas S. Birney III, president |
| of Cellular Security Group, a Massachusetts-based consulting group. |
|
|
| Air Force One and other military and government aircraft have secure satellite |
| phone links for sensitive conversations with the ground, but because these are |
| expensive to use and sometimes not operating, some calls travel over open |
| frequencies. Specific frequencies, such as those used by the president's |
| plane, are publicly available and are often listed in "scanners" publications |
| and computer bulletin boards. |
|
|
| Bush, for example, was accidentally overheard by a newspaper reporter in 1990 |
| while talking about the buildup prior to the Persian Gulf War with Senator |
| Robert Byrd (D-W.Va.). The reporter, from the Daily Times in Gloucester, |
| Massachusetts quickly began taking notes and the next day, quoted Bush in his |
| story under the headline, "Bush Graces City Airspace." |
|
|
| The vice president's chief of staff, William Kristol, was overheard castigating |
| one staff aide as a "jerk" for trying to reach him at home. |
|
|
| Some eavesdroppers may be stepping over the legal line, particularly if they |
| tape record such conversations. |
|
|
| The Electronic Communications Privacy Act prohibits intentional monitoring, |
| taping or distribution of the content of most electronic, wire or private oral |
| communications. Cellular phone calls are explicitly protected under this act. |
| Local laws often also prohibit such activity. However, some lawyers said that |
| under federal law, it is legal to intercept cordless telephone conversations as |
| well as conversations on an open radio channel. |
|
|
| The government rarely prosecutes such cases because such eavesdroppers are |
| difficult to catch. Not only that, it is hard to win convictions against |
| "listening Toms," lawyers said, because prosecutors must prove the |
| eavesdropping was intentional. |
|
|
| "Unless they prove intent they are not going to win," said Frank Terranella, |
| general counsel for the Association of North American Radio Clubs in Clifton, |
| New Jersey. "It's a very tough prosecution for them." |
|
|
| To help curb eavesdropping, the House has passed a measure sponsored by Rep. |
| Edward J. Markey (D-Mass.), chairman of the House telecommunications and |
| finance subcommittee, that would require the Federal Communications Commission |
| to outlaw any scanner that could receive cellular frequencies. The bill has |
| been sent to the Senate. |
|
|
| But there are about 10 million scanners in use, industry experts report, and |
| this year sales of scanners and related equipment such as antennas will top |
| $100 million. |
|
|
| Dedicated scanners, who collect the phone calls of high-ranking government |
| officials the way kids collect baseball cards, assemble basements full of |
| electronic gear. |
|
|
| In one sense, the electronic eavesdroppers are advanced versions of the |
| ambulance chasers who monitor police and fire calls with simpler scanning |
| equipment and then race to the scene of blazes and accidents for a close look. |
| But they also have kinship with the computer hackers who toil at breaking into |
| complex computer systems and rummaging around other's files and software |
| programs. |
|
|
| One New England eavesdropper has four scanners, each one connected to its own |
| computer, with a variety of frequencies programmed. When a conversation |
| appears on a pre-selected frequency, a computer automatically locks in on the |
| frequency to capture it. He also keeps a scanner in his car, for entertainment |
| along the road. |
|
|
| He justifies his avocation with a seemingly tortured logic. "I'm not going out |
| and stealing these signals," he said. "They're coming into my home, right |
| through my windows." |
| _______________________________________________________________________________ |
|
|
| Why Cybercrooks Love Cellular December 21, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by William G. Flanagan and Brigid McMenamin (Forbes)(Page 189) |
|
|
| Cellular phones provide cybercrooks with golden opportunities for telephone |
| toll fraud, as many shocked cellular customers are discovering. For example, |
| one US West Cellular customer in Albuquerque recently received a hefty |
| telephone bill. |
|
|
| Total: $20,000. |
|
|
| Customers are not held responsible when their phone numbers are ripped off and |
| misused. But you may be forced to have your cellular phone number changed. |
| The cellular carriers are the big losers -- to the tune of an estimated $300 |
| million per year in unauthorized calls. |
|
|
| How do the crooks get the numbers? There are two common methods: cloning and |
| tumbling. |
|
|
| Each cellular phone has two numbers -- a mobile identification number (MIN) and |
| an electronic serial number (ESN). Every time you make a call, the chip |
| transmits both numbers to the local switching office for verification and |
| billing. |
|
|
| Cloning involves altering the microchip in another cellular phone so that both |
| the MIN and ESN numbers match those stolen from a bona fide customer. The |
| altering can be done with a personal computer. The MIN and ESN numbers are |
| either purchased from insiders or plucked from the airwaves with a legal |
| device, about the size of a textbook, that can be plugged into a vehicle's |
| cigarette lighter receptacle. |
|
|
| Cellular companies are starting to watch for suspicious calling patterns. But |
| the cloning may not be detected until the customer gets his bill. |
|
|
| The second method -- tumbling -- also involves using a personal computer to |
| alter a microchip in a cellular phone so that its numbers change after every |
| phone call. Tumbling doesn't require any signal plucking. It takes advantage |
| of the fact that cellular companies allow "roaming" -- letting you make calls |
| away from your home area. |
|
|
| When you use a cellular phone far from your home base, it may take too long for |
| the local switching office to verify your MIN and ESN numbers. So the first |
| call usually goes through while the verification goes on. If the numbers are |
| invalid, no more calls will be permitted by that office on that phone. |
|
|
| In 1987 a California hacker figured out how to use his personal computer to |
| reprogram the chip in a cellular phone. Authorities say one of his pals |
| started selling altered chips and chipped-up phones. Other hackers figured out |
| how to make the chips generate new, fake ESN numbers every time the cellular |
| phone was used, thereby short-circuiting the verification process. By 1991 |
| chipped-up, tumbling ESN phones were in use all over the U.S. |
|
|
| The cellular carriers hope to scotch the problem of tumbling with instant |
| verification. But that won't stop the clones. |
|
|
| How do crooks cash in? Drug dealers buy (for up to $ 3,200) or lease (about |
| $750 per day) cellular phones with altered chips. So do the "call-sell" |
| crooks, who retail long distance calls to immigrants often for less than phone |
| companies charge. That's why a victim will get bills for calls all over the |
| world, but especially to Colombia, Bolivia and other drug-exporting countries. |
|
|