| ==Phrack Inc.== |
|
|
| Volume Four, Issue Forty-One, File 12 of 13 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Issue 41 / Part 2 of 3 PWN |
| PWN PWN |
| PWN Compiled by Datastream Cowboy PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| Government Cracks Down On Hacker November 2, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Donald Clark (The San Francisco Chronicle)(Page C1) |
|
|
| "Civil Libertarians Take Keen Interest In Kevin Poulsen Case" |
|
|
| Breaking new ground in the war on computer crime, the Justice Department plans |
| to accuse Silicon Valley's most notorious hacker of espionage. |
|
|
| Kevin Lee Poulsen, 27, touched off a 17-month manhunt before being arrested on |
| charges of telecommunications and computer fraud in April 1991. A federal |
| grand jury soon will be asked to issue a new indictment charging Poulsen with |
| violating a law against willfully sharing classified information with |
| unauthorized persons, assistant U.S. attorney Robert Crowe confirmed. |
|
|
| A 1988 search of Poulsen's Menlo Park storage locker uncovered a set of secret |
| orders from a military exercise, plus evidence that Poulsen may have tried to |
| log onto an Army data network and eavesdropped on a confidential investigation |
| of former Philippine President Ferdinand Marcos. It is not clear whether the |
| new charge stems from these or other acts. |
|
|
| Poulsen did not hand secrets to a foreign power, a more serious crime, Crowe |
| noted. But by using an espionage statute against a U.S. hacker for the first |
| time, prosecutors raise the odds of a record jail sentence that could be used |
| to deter other electronic break-ins. |
|
|
| They could use a stronger deterrent. Using personal computers connected to |
| telephone lines, cadres of so-called cyberpunks have made a sport of tapping |
| into confidential databases and voicemail systems at government agencies and |
| corporations. Though there is no reliable way to tally the damage, a 1989 |
| survey indicated that computer crimes may cost U.S. business $500 million a |
| year, according to the Santa Cruz-based National Center for Computer Crime |
| Data. |
|
|
| Telephone companies, whose computers and switching systems have long been among |
| hackers' most inviting targets, are among those most anxious to tighten |
| security. Poulsen allegedly roamed at will through the networks of Pacific |
| Bell, for example, changing records and even intercepting calls between Pac |
| Bell security personnel who were on his trail. |
|
|
| The San Francisco-based utility has been intimately involved in his |
| prosecution; Poulsen was actually captured in part because one of the company's |
| investigators staked out a suburban Los Angeles supermarket where the fugitive |
| shopped. |
|
|
| "Virtually everything we do these days is done in a computer --your credit |
| cards, your phone bills," said Kurt von Brauch, a Pac Bell security officer who |
| tracked Poulsen, in an interview last year. "He had the knowledge to go in |
| there and alter them." |
|
|
|
|
| BROAD LEGAL IMPACT |
|
|
| Poulsen's case could have broad impact because of several controversial legal |
| issues involved. Some civil libertarians, for example, question the Justice |
| Department's use of the espionage statute, which carries a maximum 10-year |
| penalty and is treated severely under federal sentencing guidelines. They |
| doubt the law matches the actions of Poulsen, who seems to have been motivated |
| more by curiosity than any desire to hurt national security. |
|
|
| "Everything we know about this guy is that he was hacking around systems for |
| his own purposes," said Mike Godwin, staff counsel for the Electronic Frontier |
| Foundation, a public-interest group that has tracked Poulsen's prosecution. He |
| termed the attempt to use the statute against Poulsen "brain-damaged." |
|
|
| Poulsen, now in federal prison in Pleasanton, has already served 18 months in |
| jail without being tried for a crime, much less convicted. Though federal |
| rules are supposed to ensure a speedy trial, federal judges can grant extended |
| time to allow pretrial preparation in cases of complex evidence or novel legal |
| issues. |
|
|
| Both are involved here. After he fled to Los Angeles to avoid prosecution, |
| for example, Poulsen used a special scrambling scheme on one computer to make |
| his data files unintelligible to others. It has taken months to decode that |
| data, and the job isn't done yet, Crowe said. That PC was only found because |
| authorities intercepted one of Poulsen's phone conversations from jail, other |
| sources said. |
|
|
|
|
| CHARGES LABELED ABSURD |
|
|
| Poulsen declined requests for interviews. His attorney, Paul Meltzer, terms |
| the espionage charge absurd. He is also mounting several unusual attacks on |
| parts of the government's original indictment against Poulsen, filed in 1989. |
|
|
| He complains, for example, that the entire defense team is being subjected to |
| 15-year background checks to obtain security clearances before key documents |
| can be examined. |
|
|
| "The legal issues are fascinating," Meltzer said. "The court will be forced to |
| make law." |
|
|
| Poulsen's enthusiasm for exploring forbidden computer systems became known to |
| authorities in 1983. The 17-year-old North Hollywood resident, then using the |
| handle Dark Dante, allegedly teamed up with an older hacker to break into |
| ARPAnet, a Pentagon-organized computer network that links researchers and |
| defense contractors around the country. He was not charged with a crime because |
| of his age. |
|
|
| Despite those exploits, Poulsen was later hired by SRI International, a Menlo |
| Park-based think tank and government contractor, and given an assistant |
| programming job with a security clearance. Though SRI won't comment, one |
| source said Poulsen's job involved testing whether a public data network, by |
| means of scrambling devices, could be used to confidentially link classified |
| government networks. |
|
|
| But Poulsen apparently had other sidelines. Between 1985 and 1988, the Justice |
| Department charges, Poulsen burglarized or used phony identification to sneak |
| into several Bay Area phone company offices to steal equipment and confidential |
| access codes that helped him monitor calls and change records in Pac Bell |
| computers, prosecutors say. |
|
|
|
|
| CACHE OF PHONE GEAR |
|
|
| The alleged activities came to light because Poulsen did not pay a bill at the |
| Menlo/Atherton Storage Facility. The owner snipped off a padlock on a storage |
| locker and found an extraordinary cache of telephone paraphernalia. A 19-count |
| indictment, which also named two of Poulsen's associates, included charges of |
| theft of government property, possession of wire-tapping devices and phony |
| identification. |
|
|
| One of Poulsen's alleged accomplices, Robert Gilligan, last year pleaded guilty |
| to one charge of illegally obtaining Pac Bell access codes. Under a plea |
| bargain, Gilligan received three years of probation, a $25,000 fine, and agreed |
| to help authorities in the Poulsen prosecution. Poulsen's former roommate, |
| Mark Lottor, is still awaiting trial. |
|
|
| A key issue in Poulsen's case concerns CPX Caber Dragon, a code name for a |
| military exercise in Fort Bragg, North Carolina. In late 1987 or early 1988, |
| the government charges, Poulsen illegally obtained classified orders for the |
| exercise. But Meltzer insists that the orders had been declassified by the |
| time they were seized, and were reclassified after the fact to prosecute |
| Poulsen. Crowe said Meltzer has his facts wrong. "That's the same as saying |
| we're framing Poulsen," Crowe said. "That's the worst sort of accusation I can |
| imagine." |
|
|
| Another dispute focuses on the charge of unauthorized access to government |
| computers. FBI agents found an electronic copy of the banner that a computer |
| user sees on first dialing up an Army network called MASNET, which includes a |
| warning against unauthorized use of the computer system. Meltzer says Poulsen |
| never got beyond this computer equivalent of a "No Trespassing" sign. |
|
|
| Furthermore, Meltzer argues that the law is unconstitutional because it does |
| not sufficiently define whether merely dialing up a computer qualifies as |
| illegal "access." |
|
|
| Meltzer also denies that Poulsen could eavesdrop on calls. The indictment |
| accuses him of illegally owning a device called a direct access test unit, |
| which it says is "primarily useful" for surreptitiously intercepting |
| communications. But Meltzer cites an equipment manual showing that the system |
| is specifically designed to garble conversations, though it allows phone |
| company technicians to tell that a line is in use. |
|
|
| Crowe said he will soon file written rebuttals to Meltzer's motions. In |
| addition to the new indictment he is seeking, federal prosecutors in Los |
| Angeles are believed to be investigating Poulsen's activities while a fugitive. |
| Among other things, Poulsen reportedly taunted FBI agents on computer bulletin |
| boards frequented by hackers. |
|
|
|
|
| PHONE COMPANIES WORRIED |
|
|
| Poulsen's prosecution is important to the government -- and phone companies -- |
| because of their mixed record so far in getting convictions in hacker cases. |
|
|
| In one of the most embarrassing stumbles, a 19-year-old University of Missouri |
| student named Craig Neidorf was indicted in February 1990 on felony charges for |
| publishing a memorandum on the emergency 911 system of Bell South. The case |
| collapsed when the phone company information -- which the government said was |
| worth $79,940 -- was shown by the defense to be available from another Bell |
| system for just $13.50. |
|
|
| Author Bruce Sterling, whose "The Hacker Crackdown" surveys recent high-tech |
| crime and punishment, thinks the phone company overstates the dangers from |
| young hackers. On the other hand, a Toronto high school student electronically |
| tampered with that city's emergency telephone dispatching system and was |
| arrested, he noted. |
|
|
| Because systems that affect public safety are involved, law enforcement |
| officials are particularly anxious to win convictions and long jail sentences |
| for the likes of Poulsen. |
|
|
| "It's very bad when the government goes out on a case and loses," said one |
| computer-security expert who asked not to be identified. "They are desperately |
| trying to find something to hang him on." |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Computer Hacker Charged With Stealing Military Secrets December 8, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Taken from the Associated Press |
|
|
| SAN FRANCISCO -- A computer hacker has been charged with stealing Air Force |
| secrets that allegedly included a list of planned targets in a hypothetical |
| war. |
|
|
| Former Silicon Valley computer whiz Kevin Poulsen, who was accused in the early |
| 1980s as part of a major hacking case, was named in a 14-count indictment |
| issued Monday. |
|
|
| He and an alleged accomplice already face lesser charges of unlawful use of |
| telephone access devices, illegal wiretapping and conspiracy. |
|
|
| Poulsen, 27, of Los Angeles, faces 7-to-10 years in prison if convicted of the |
| new charge of gathering defense information, double the sentence he faced |
| previously. |
|
|
| His lawyer, Paul Meltzer, says the information was not militarily sensitive and |
| that it was reclassified by government officials just so they could prosecute |
| Poulsen on a greater charge. |
|
|
| A judge is scheduled to rule February 1 on Meltzer's motion to dismiss the |
| charge. |
|
|
| In the early 1980s, Poulsen and another hacker going by the monicker Dark Dante |
| were accused of breaking into UCLA's computer network in one of the first |
| prosecutions of computer hacking. |
|
|
| He escaped prosecution because he was then a juvenile and went to work at Sun |
| Microsystems in Mountain View. |
|
|
| While working for Sun, Poulsen illegally obtained a computer tape containing a |
| 1987 order concerning a military exercise code-named Caber Dragon 88, the |
| government said in court papers. The order is classified secret and contains |
| names of military targets, the government said. |
|
|
| In 1989, Poulsen and two other men were charged with stealing telephone access |
| codes from a Pacific Bell office, accessing Pacific Bell computers, obtaining |
| unpublished phone numbers for the Soviet Consulate in San Francisco; dealing in |
| stolen telephone access codes; and eavesdropping on two telephone company |
| investigators. |
|
|
| Poulsen remained at large until a television show elicited a tip that led to |
| his capture in April 1991. |
|
|
| He and Mark Lottor, 27, of Menlo Park, are scheduled to be tried in March. The |
| third defendant, Robert Gilligan, has pleaded guilty and agreed to pay Pacific |
| Bell $25,000. He is scheduled to testify against Lottor and Poulsen as part of |
| a plea bargain. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| CA Computer Whiz Is First Hacker Charged With Espionage December 10, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by John Enders (The Associated Press) |
|
|
| SAN JOSE, California -- A 28-year-old computer whiz who reportedly once tested |
| Department of Defense security procedures has become the first alleged computer |
| hacker to be charged with espionage. |
|
|
| The government says Kevin Lee Poulsen stole classified military secrets and |
| should go to prison. But his lawyer calls him "an intellectually curious |
| computer nerd." |
|
|
| Poulsen, of Menlo Park, California, worked in the mid-1980s as a consultant |
| testing Pentagon computer security. Because of prosecution delays, he was held |
| without bail in a San Jose jail for 20 months before being charged this week. |
|
|
| His attorney, Paul Meltzer, says that Poulsen did not knowingly possess |
| classified information. The military information had been declassified by the |
| time prosecutors say Poulsen obtained it, Meltzer said. |
|
|
| "They are attempting to make him look like Julius Rosenberg," Meltzer said of |
| the man executed in 1953 for passing nuclear-bomb secrets to the Soviet Union. |
| "It's just ridiculous." |
|
|
| Poulsen was arrested in 1988 on lesser but related hacking charges. He |
| disappeared before he was indicted and was re-arrested in Los Angeles in April |
| 1991. Under an amended indictment, he was charged with illegal possession of |
| classified government secrets. |
|
|
| Poulsen also is charged with 13 additional counts, including eavesdropping on |
| private telephone conversations and stealing telephone company equipment. |
|
|
| If convicted on all counts, he faces up to 85 years in prison and fines |
| totaling $3.5 million, said Assistant U.S. Attorney Robert Crowe in San |
| Francisco. |
|
|
| On Monday (12/7), Poulsen pleaded innocent to all charges. He was handed over |
| to U.S. Marshals in San Jose on Wednesday (12/9) and was being held at a |
| federal center in Pleasanton near San Francisco. |
|
|
| He hasn't been available for comment, but in an earlier letter from prison, |
| Poulsen called the charges "ludicrous" and said the government is taking |
| computer hacking too seriously. |
|
|
| U.S. Attorney John A. Mendez said Wednesday (12/9) that Poulsen is not |
| suspected of turning any classified or non-classified information over to a |
| foreign power, but he said Poulsen's alleged activities are being taken very |
| seriously. |
|
|
| "He's unique. He's the first computer hacker charged with this type of |
| violation -- unlawful gathering of defense information," Mendez said. |
|
|
| Assistant U.S. Attorney Robert Crowe said the espionage charge was entered only |
| after approval from the Justice Department's internal security section in |
| Washington. |
|
|
| The indictment alleges that Poulsen: |
|
|
| - Tapped into the Pacific Bell Co.'s computer and collected unpublished |
| telephone numbers and employee lists for the Soviet Consulate in San |
| Francisco. |
|
|
| - Stole expensive telephone switching and other equipment. |
|
|
| - Retrieved records of phone company security personnel and checked records of |
| their own calls to see if they were following him. |
|
|
| - Eavesdropped on telephone calls and computer electronic mail between phone |
| company investigators and some of his acquaintances. |
|
|
| - Tapped into an unclassified military computer network known as Masnet. |
|
|
| - Obtained a classified document on flight orders for a military exercise |
| involving thousands of paratroopers at the Army's Fort Bragg in North |
| Carolina. |
|
|
| The offenses allegedly took place between 1986 and 1988. |
|
|
| In 1985, the Palo Alto, California, think tank SRI International hired Poulsen |
| to work on military contracts, including a sensitive experiment to test |
| Pentagon computer security, according to published reports. SRI has declined |
| to comment on the case. |
| _______________________________________________________________________________ |
|
|
| Hacker For Hire October 19, 1992 |
| ~~~~~~~~~~~~~~~ |
| by Mark Goodman and Allison Lynn (People)(Page 151) |
|
|
| "Real-life Sneaker Ian Murphy puts the byte on corporate spies." |
|
|
| THERE'S NO PRIVACY THESE DAYS," says Ian Murphy. "Just imagine going into GM's |
| or IBM's accounts and wiping them out. You can bring about economic collapse |
| by dropping in a virus without them even knowing it." Scoff at your peril, |
| Corporate America. Captain Zap -- as Murphy is known in the electronic |
| underworld of computer hackers -- claims there's no computer system he can't |
| crack, and hence no mechanical mischief he can't wreak on corporations or |
| governments. And Murphy, 35, has the track record -- not to mention the |
| criminal record -- to back up his boasts. |
|
|
| Murphy's fame in his subterranean world is such that he worked as a consultant |
| for Sneakers, the hit film about a gang of computer-driven spies (Robert |
| Redford, Sidney Poitier, Dan Aykroyd) lured into doing some high-risk |
| undercover work for what they believe is the National Security Agency. |
|
|
| Murphy loved the way the movie turned out. "It's like a training film for |
| hackers," he says, adding that he saw much of himself in the Aykroyd character, |
| a pudgy, paranoid fantasist named Mother who, like Murphy, plows through |
| people's trash for clues. In fact when Aykroyd walked onscreen covered with |
| trash, Murphy recalls, "My friends turned to me and said, 'Wow, that's you!'" |
| If that sounds like a nerd's fantasy, then check out Captain Zap's credentials. |
| Among the first Americans to be convicted of a crime involving computer break- |
| ins, he served only some easy community-service time in 1983 before heading |
| down the semistraight, not necessarily narrow, path of a corporate spy. |
|
|
| Today, Murphy, 35, is president of IAM Secure Data Systems, a security |
| consultant group he formed in 1982. For a fee of $5,000 a day plus expenses, |
| Murphy has dressed up as a phone-company employee and cracked a bank's security |
| system, he has aided a murder investigation for a drug dealer's court defense, |
| and he has conducted a terrorism study for a major airline. His specialty, |
| though, is breaking into company security systems -- an expertise he applied |
| illegally in his outlaw hacker days and now, legally, by helping companies |
| guard against such potential break-ins. Much of his work lately, he says, |
| involves countersurveillance -- that is, finding out if a corporation's |
| competitors are searching its computer systems for useful information. "It's |
| industrial spying," Murphy says, "and it's happening all over the place." |
|
|
| Murphy came by his cloak-and-daggerish calling early. He grew up in Gladwyne, |
| Pennsylvania, on Philadelphia's Main Line, the son of Daniel Murphy, a retired |
| owner of a stevedoring business, and his wife, Mary Ann, an advertising |
| executive. Ian recalls, "As a kid, I was bored. In science I did wonderfully. |
| The rest of it sucked. And social skills weren't my thing." |
|
|
| Neither was college. Ian had already begun playing around with computers at |
| Archbishop Carroll High School; after graduation he joined the Navy. He got an |
| early discharge in 1975 when the Navy didn't assign him to radio school as |
| promised, and he returned home to start hacking with a few pals. In his |
| heyday, he claims, he broke into White House and Pentagon computers. "In the |
| Pentagon," he says, "we were playing in the missile department, finding out |
| about the new little toys they were developing and trying to mess with their |
| information. None of our break-ins had major consequences, but it woke them the |
| hell up because they [had] all claimed it couldn't be done." |
|
|
| Major consequences came later. Murphy and his buddies created dummy |
| corporations with Triple-A credit ratings and ordered thousands of dollars' |
| worth of computer equipment. Two years later the authorities knocked at |
| Murphy's door. His mother listened politely to the charges, then earnestly |
| replied, "You have the wrong person. He doesn't know anything about |
| computers." |
|
|
| Right. Murphy was arrested and convicted of receiving stolen property in 1982. |
| But because there were no federal computer-crime laws at that time, he got off |
| with a third-degree felony count. He was fined $1,000, ordered to provide |
| 1,000 hours of community service (he worked in a homeless shelter) and placed |
| on probation for 2 1/2 years. "I got off easy," he concedes. |
|
|
| Too easy, by his own mother's standards. A past president of Republican Women |
| of the Main Line, Mary Ann sought out her Congressman, Larry Coughlin, and put |
| the question to him: "How would you like it if the next time you ran for |
| office, some young person decided he was going to change all of your files?" |
| Coughlin decided he wouldn't like it and raised the issue on the floor of |
| Congress in 1983. The following year, Congress passed a national computer- |
| crime law, making it illegal to use a computer in a manner not authorized by |
| the owner. |
|
|
| Meanwhile, Murphy, divorced in 1977 after a brief marriage, had married Carol |
| Adrienne, a documentary film producer, in 1982. Marriage evidently helped set |
| Murphy straight, and he formed his company -- now with a staff of 12 that |
| includes a bomb expert and a hostage expert. Countersurveillance has been |
| profitable (he's making more than $250,000 a year and is moving out of his |
| parents' house), but it has left him little time to work on his social skills - |
| - or for that matter his health. At 5 ft.6 in. and 180 lbs., wearing jeans, |
| sneakers and a baseball cap, Murphy looks like a Hollywood notion of himself. |
| He has suffered four heart attacks since 1986 but unregenerately smokes a pack |
| of cigarettes a day and drinks Scotch long before the sun falls over the |
| yardarm. |
|
|
| He and Carol divorced in April 1991, after 10 years of marriage. "She got |
| ethics and didn't like the work I did," he says. These days Murphy dates -- |
| but not until he thoroughly "checks" the women he goes out with. "I want to |
| know who I'm dealing with because I could be dealing with plants," he explains. |
| "The Secret Service plays games with hackers." |
|
|
| Murphy does retain a code of honor. He will work for corporations, helping to |
| keep down the corporate crime rate, he says, but he won't help gather evidence |
| to prosecute fellow hackers. Indeed his rogue image makes it prudent for him |
| to stay in the background. Says Reginald Branham, 23, president of Cyberlock |
| Consulting, with whom Murphy recently developed a comprehensive antiviral |
| system: "I prefer not to take Ian to meetings with CEOs. They're going to |
| listen to him and say, 'This guy is going to tear us apart.'" And yet Captain |
| Zap, for all his errant ways, maintains a certain peculiar charm. "I'm like |
| the Darth Vader of the computer world," he insists. "In the end I turn out to |
| be the good guy." |
|
|
| (Photograph 1 = Ian Murphy) |
| (Photograph 2 = River Phoenix, Robert Redford, Dan Aykroyd, and Sidney Poitier) |
| (Photograph 3 = Mary Ann Murphy <Ian's mom>) |
| _______________________________________________________________________________ |
|
|
| Yacking With A Hack August 1992 |
| ~~~~~~~~~~~~~~~~~~~ |
| by Barbara Herman (Teleconnect)(Page 60) |
|
|
| "Phone phreaking for fun, profit & politics." |
|
|
| Ed is an intelligent, articulate 18 year old. He's also a hacker, a self- |
| professed "phreak" -- the term that's developed in a subculture of usually |
| young, middle-class computer whizzes. |
|
|
| I called him at his favorite phone booth. |
|
|
| Although he explained how he hacks as well as what kinds of hacking he has been |
| involved in, I was especially interested in why he hacks. |
|
|
| First off, Ed wanted to make it clear he doesn't consider himself a |
| "professional" who's in it only for the money. He kept emphasizing that |
| "hacking is not only an action, it's a state of mind." |
|
|
| Phreaks even have an acronym-based motto that hints at their overblown opinions |
| of themselves. PHAC. It describes what they do: "phreaking," "hacking," |
| "anarchy" and "carding." In other words, they get into systems over the |
| telecom network (phreaking), gain access (hacking), disrupt the systems |
| (political anarchy) and use peoples' calling/credit cards for their personal |
| use. |
|
|
| Throughout our talk, Ed showed no remorse for hacking. Actually, he had |
| contempt for those he hacked. Companies were "stupid" because their systems' |
| were so easy to crack. They deserved it. |
|
|
| As if they should have been thankful for his mercy, he asked me to imagine what |
| would have happened if he really hacked one railway company's system (he merely |
| left a warning note), changing schedules and causing trains to collide. |
|
|
| He also had a lot of disgust for the "system," which apparently includes big |
| business (he is especially venomous toward AT&T), government, the FBI, known as |
| "the Gestapo" in phreak circles, and the secret service, whose "intelligence |
| reflects what their real jobs should be, secret service station attendants." |
|
|
| He doesn't really believe any one is losing money on remote access toll fraud. |
|
|
| He figures the carriers are angry not about money lost but rather hypothetical |
| money, the money they could have charged for the free calls the hackers made, |
| which he thinks are overpriced to begin with. |
|
|
| He's also convinced (wrongly) that companies usually don't foot the bill for |
| the free calls hackers rack up on their phone systems. "And, besides, if some |
| multi-million dollar corporation has to pay, I'm certainly not going to cry for |
| them." |
|
|
| I know. A twisted kid. Weird. But besides his skewed ethics, there's also a |
| bunch of contradictions. |
|
|
| He has scorn for companies who can't keep him out, even though he piously warns |
| them to try. |
|
|
| He dismisses my suggestion that the "little guy" is in fact paying the bills |
| instead of the carrier. And yet he says AT&T is overcharging them for the |
| "vital" right to communicate with each other. |
|
|
| He also contradicted his stance of being for the underdog by calling the |
| railway company "stupid" for not being more careful with their information. |
|
|
| Maybe a railway company is not necessarily the "little guy," but it hardly |
| seems deserving of the insults Ed hurled at it. When I mentioned that a |
| hospital in New York was taken for $100,000 by hackers, he defended the hackers |
| by irrelevantly making the claim that doctors easily make $100,000 a year. |
| Since when did doctors pay hospital phone bills? |
|
|
| What Ed is good at is rationalizing. He lessens his crimes by raising them to |
| the status of political statements, and yet in the same breath, for example, he |
| talks about getting insider info on the stock market and investing once he |
| knows how the stock is doing. He knows it's morally wrong, he told me, but |
| urged me to examine this society that "believes in making a buck any way you |
| can. It's not a moral society." |
|
|
| Amazingly enough, the hacker society to which Ed belongs, if I can |
| unstatistically use him as a representative of the whole community, is just as |
| tangled in the contradictions of capitalism as the "system" they supposedly |
| loathe. In fact, they are perhaps more deluded and hypocritical because they |
| take a political stance rather than recognizing their crimes for what they are. |
| How can Ed or anyone else in the "phreaking" community take seriously their |
| claims of being against big business and evil capitalism when they steal |
| people's credit-card and calling-card numbers and use them for their own |
| profit? |
|
|
| The conversation winded down after Ed rhapsodized about the plight of the |
| martyred hacker who is left unfairly stigmatized after he is caught, or "taken |
| down." |
|
|
| One time the Feds caught his friend hacking ID codes, had several phone |
| companies and police search his house, and had his computer taken away. Even |
| though charges were not filed, Ed complained, "It's not fair." |
|
|
| That's right, phreak. They should have thrown him in prison. |
| _______________________________________________________________________________ |
|
|
| Computer Hacker On Side Of Law September 23, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Shelby Grad (Los Angeles Times)(Page B3) |
|
|
| COSTA MESA, CA -- Philip Bettencourt's formal title is photo lab supervisor for |
| the Costa Mesa Police Department. But on Tuesday afternoon, he served as the |
| department's official computer hacker. |
|
|
| Bettencourt, pounding the keyboard excitedly as other officers looked on, was |
| determined to find information within a stolen computer's vast memory that |
| would link the machine to its owner. |
|
|
| So far, he had made matches for all but two of the 26 computers recovered |
| earlier this month by police as part of a countywide investigation of stolen |
| office equipment. This would be number 25. |
|
|
| First, he checked the hard drive's directory, searching for a word-processing |
| program that might include a form letter or fax cover sheet containing the |
| owner's name, address or phone number. |
|
|
| When that failed, he tapped into an accounting program, checking for clues on |
| the accounts payable menu. |
|
|
| "Bingo!" Bettencourt yelled a few minutes into his work. He found an invoice |
| account number to a Fountain Valley cement company that might reveal the |
| owner's identity. Seconds later, he came across the owner's bank credit-card |
| number. |
|
|
| And less than a minute after that, Bettencourt hit pay dirt: The name of a |
| Santa Ana building company that, when contacted, revealed that it had indeed |
| been the victim of a recent computer burglary. |
|
|
| "This is great," said Bettencourt, who has been interested in computers for |
| nearly two decades now, ever since Radio Shack put its first model on the |
| market. "I love doing this. This is hacking, but it's in a good sense, not |
| trying to hurt someone. This is helping people." |
|
|
| Few computer owners who were reunited with their equipment would contest that. |
| When Costa Mesa police recovered $250,000 worth of computers, fax machines, |
| telephones and other office gadgets, detectives were faced with the difficult |
| task of matching machines bearing few helpful identifying marks to their |
| owners, said investigator Bob Fate. |
|
|
| Enter Bettencourt, who tapped into the computers' hard drives, attempting to |
| find the documents that would reveal from whom the machines were taken. |
|
|
| As of Tuesday, all but $50,000 worth of equipment was back in owners' hands. |
| Investigators suggested that people who recently lost office equipment call the |
| station to determine if some of the recovered gadgetry belongs to them. |
|
|
| Ironically, the alleged burglars tripped themselves up by not erasing the data |
| from the computers before reselling the machines, authorities said. A college |
| student who purchased one of the stolen computers found data from the previous |
| owner, whom he contacted. Police were then called in, and a second "buy" was |
| scheduled in which several suspects were arrested, Fate said. |
|
|
| Three people were arrested September 15 and charged with receiving and |
| possessing stolen property. Police are still searching for the burglars. |
|
|
| The office equipment was recovered from an apartment and storage facility in |
| Santa Ana. |
|
|
| Bettencourt matched the final stolen computer to its owner before sundown |
| Tuesday. |
| _______________________________________________________________________________ |
|
|
| CuD's 1992 MEDIA HYPE Award To FORBES MAGAZINE |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Jim Thomas (Computer Underground Digest) |
|
|
| In recent years, media depiction of "hackers" has been criticized for |
| inaccurate and slanted reporting that exaggerates the public dangers of the |
| dread "hacker menace." As a result, CuD annually recognizes the year's most |
| egregious example of media hype. |
|
|
| The 1992 annual CuD GERALDO RIVERA MEDIA HYPE award goes to WILLIAM G. FLANAGAN |
| AND BRIGID McMENAMIN for their article "The Playground Bullies are Learning how |
| to Type" in the 21 December issue of Forbes (pp 184-189). The authors improved |
| upon last year's winner, Geraldo himself, in inflammatory rhetoric and |
| distorted narrative that seems more appropriate for a segment of "Inside |
| Edition" during sweeps week than for a mainstream conservative periodical. |
|
|
| The Forbes piece is the hands-down winner for two reasons. First, one reporter |
| of the story, Brigid McMenamin, was exceptionally successful in creating for |
| herself an image as clueless and obnoxious. Second, the story itself was based |
| on faulty logic, rumors, and some impressive leaps of induction. Consider the |
| following. |
|
|
|
|
| The Reporter: Brigid McMenamin |
|
|
| It's not only the story's gross errors, hyperbole, and irresponsible distortion |
| that deserve commendation/condemnation, but the way that Forbes reporter Brigid |
| McMenamin tried to sell herself to solicit information. |
|
|
| One individual contacted by Brigid McM claimed she called him several times |
| "bugging" him for information, asking for names, and complaining because |
| "hackers" never called her back. He reports that she explicitly stated that |
| her interest was limited to the "illegal stuff" and the "crime aspect" and was |
| oblivious to facts or issues that did not bear upon hackers-as-criminals. |
|
|
| Some persons present at the November 2600 meeting at Citicorp, which she |
| attended, suggested the possibility that she used another reporter as a |
| credibility prop, followed some of the participants to dinner after the |
| meeting, and was interested in talking only about illegal activities. One |
| observer indicated that those who were willing to talk to her might not be the |
| most credible informants. Perhaps this is one reason for her curious language |
| in describing the 2600 meeting. |
|
|
| Another person she contacted indicated that she called him wanting names of |
| people to talk to and indicated that because Forbes is a business magazine, it |
| only publishes the "truth." Yet, she seemed not so much interested in "truth," |
| but in finding "evidence" to fit a story. He reports that he attempted to |
| explain that hackers generally are interested in Unix and she asked if she |
| could make free phone calls if she knew Unix. Although the reporter stated to |
| me several times that she had done her homework, my own conversation with her |
| contradicted her claims, and if the reports of others are accurate, here claims |
| of preparation seem disturbingly exaggerated. |
|
|
| I also had a rather unpleasant exchange with Ms. McM. She was rude, abrasive, |
| and was interested in obtaining the names of "hackers" who worked for or as |
| "criminals." Her "angle" was clearly the hacker-as-demon. Her questions |
| suggested that she did not understand the culture about which she was writing. |
| She would ask questions and then argue about the answer, and was resistant to |
| any "facts" or responses that failed to focus on "the hacker criminal." She |
| dropped Emmanuel Goldstein's name in a way that I interpreted as indicating a |
| closer relationship than she had--an incidental sentence, but one not without |
| import -- which I later discovered was either an inadvertently misleading |
| choice of words or a deliberate attempt to deceptively establish credentials. |
| She claimed she was an avowed civil libertarian. I asked why, then, she didn't |
| incorporate some of those issues. She invoked publisher pressure. Forbes is a |
| business magazine, she said, and the story should be of interest to readers. |
| She indicated that civil liberties weren't related to "business." She struck |
| me as exceptionally ill-informed and not particularly good at soliciting |
| information. She also left a post on Mindvox inviting "hackers" who had been |
| contacted by "criminals" for services to contact her. |
|
|
| >Post: 150 of 161 |
| >Subject: Hacking for Profit? |
| >From: forbes (Forbes Reporter) |
| >Date: Tue, 17 Nov 92 13:17:34 EST |
| > |
| >Hacking for Profit? Has anyone ever offered to pay you (or |
| >a friend) to get into a certain system and alter, destroy or |
| >retrieve information? Can you earn money hacking credit |
| >card numbers, access codes or other information? Do you know |
| >where to sell it? Then I'd like to hear from you. I'm |
| >doing research for a magazine article. We don't need you |
| >name. But I do want to hear your story. Please contact me |
| >Forbes@mindvox.phantom.com. |
|
|
| However, apparently she wasn't over-zealous about following up her post or |
| reading the Mindvox conferences. When I finally agreed to send her some |
| information about CuD, she insisted it be faxed rather than sent to Mindvox |
| because she was rarely on it. Logs indicate that she made only six calls to |
| the board, none of which occurred after November 24. |
|
|
| My own experience with the Forbes reporter was consistent with those of others. |
| She emphasized "truth" and "fact-checkers," but the story seems short on both. |
| She emphasized explicitly that her story would *not* be sensationalistic. She |
| implied that she wanted to focus on criminals and that the story would have the |
| effect of presenting the distinction between "hackers" and real criminals. |
| Another of her contacts also appeared to have the same impression. After our |
| less-than-cordial discussion, she reported it to the contact, and he attempted |
| to intercede on her behalf in the belief that her intent was to dispel many of |
| the media inaccuracies about "hacking." If his interpretation is correct, then |
| she deceived him as well, because her portrayal of him in the story was |
| unfavorably misleading. |
|
|
| In CuD 4.45 (File #3), we ran Mike Godwin's article on "How to Talk to the |
| Press," which should be required reading. His guidelines included: |
|
|
| 1) TRY TO THINK LIKE THE REPORTER YOU'RE TALKING TO. |
| 2) IF YOU'RE GOING TO MEET THE REPORTER IN PERSON, TRY TO |
| BRING SOMETHING ON PAPER. |
| 3) GIVE THE REPORTER OTHER PEOPLE TO TALK TO, IF POSSIBLE. |
| 4) DON'T ASSUME THAT THE REPORTER WILL COVER THE STORY THE WAY |
| YOU'D LIKE HER TO. |
|
|
| Other experienced observers contend that discussing "hacking" with the press |
| should be avoided unless one knows the reporter well or if the reporter has |
| established sufficient credentials as accurate and non-sensationalist. Using |
| these criteria, it will probably be a long while before any competent |
| cybernaught again speaks to Brigid McMenamin. |
|
|
|
|
| The Story |
|
|
| Rather than present a coherent and factual story about the types of computer |
| crime, the authors instead make "hackers" the focal point and use a narrative |
| strategy that conflates all computer crime with "hackers." |
|
|
| The story implies that Len Rose is part of the "hacker hood" crowd. The lead |
| reports Rose's prison experience and relates his feeling that he was "made an |
| example of" by federal prosecutors. But, asks the narrative, if this is so, |
| then why is the government cracking down? Whatever else one might think of Len |
| Rose, no one ever has implied that he as a "playground bully" or "hacker hood." |
| The story also states that 2600 Magazine editor Emmanuel Goldstein "hands |
| copies <of 2600> out free of charge to kids. Then they get arrested." (p. 188- |
| -a quote attributed to Don Delaney), and distorts (or fabricates) facts to fit |
| the slant: |
|
|
| According to one knowledgeable source, another hacker brags |
| that he recently found a way to get into Citibank's |
| computers. For three months he says he quietly skimmed off a |
| penny or so from each account. Once he had $200,000, he quit. |
| Citibank says it has no evidence of this incident and we |
| cannot confirm the hacker's story. But, says computer crime |
| expert Donn Parker of consultants SRI International: "Such a |
| 'salami attack' is definitely possible, especially for an |
| insider" (p. 186). |
|
|
| Has anybody calculated how many accounts one would have to "skim" a few pennies |
| from before obtaining $200,000? At a dime apiece, that's over 2 million. If |
| I'm figuring correctly, at one minute per account, 60 accounts per minute non- |
| stop for 24 hours a day all year, it would take nearly 4 straight years of on- |
| line computer work for an out-sider. According to the story, it took only 3 |
| months. At 20 cents an account, that's over a million accounts. |
|
|
| Although no names or evidence are given, the story quotes Donn Parker of SRI as |
| saying that the story is a "definite possibility." Over the years, there have |
| been cases of skimming, but as I remember the various incidents, all have been |
| inside jobs and few, if any, involved hackers. The story is suspiciously |
| reminiscent of the infamous "bank cracking" article published in Phrack as a |
| spoof several years ago. |
|
|
| The basis for the claim that "hacker hoods" (former "playground bullies") are |
| now dangerous is based on a series of second and third-hand rumors and myths. |
| The authors then list from "generally reliable press reports" a half-dozen or |
| so non-hacker fraud cases that, in context, would seem to the casual reader to |
| be part of the "hacker menace." I counted in the article at least 24 instances |
| of half-truths, inaccuracies, distortions, questionable/spurious links, or |
| misleading claims that are reminiscent of 80s media hype. For example, the |
| article attributes to Phiber Optik counts in the MOD indictment that do not |
| include him, misleads on the Len Rose indictment and guilty plea, uses second |
| and third hand information as "fact" without checking the reliability, and |
| presents facts out of context (such as attributing the Morris Internet worm to |
| "hackers). |
|
|
| Featured as a key "hacker hood" is "Kimble," a German hacker said by some to be |
| sufficiently media-hungry and self-serving that he is ostracized by other |
| German hackers. His major crime reported in the story is hacking into PBXes. |
| While clearly wrong, his "crime" hardly qualifies him for the "hacker |
| hood/organized crime" danger that's the focus of the story. Perhaps he is |
| engaged in other activities unreported by the authors, but it appears he is |
| simply a run-of-the-mill petty rip-off artist. In fact, the authors do not make |
| much of his crimes. Instead, they leap to the conclusion that "hackers" do the |
| same thing and sell the numbers "increasingly" to criminals without a shred of |
| evidence for the leap. To be sure the reader understands the menace, the |
| authors also invoke unsubstantiated images of a hacker/Turkish Mafia connection |
| and suggest that during the Gulf war, one hacker was paid "millions" to invade |
| a Pentagon computer and retrieve information from a spy satellite (p. 186). |
|
|
| Criminals use computers for crime. Some criminals may purchase numbers from |
| others. But the story paints a broader picture, and equates all computer crime |
| with "hacking." The authors' logic seems to be that if a crime is committed |
| with a computer, it's a hacking crime, and therefore computer crime and |
| "hackers" are synonymous. The story ignores the fact that most computer crime |
| is an "inside job" and it says nothing about the problem of security and how |
| the greatest danger to computer systems is careless users. |
|
|
| One short paragraph near the end mentions the concerns about civil liberties, |
| and the next paragraph mentions that EFF was formed to address these concerns. |
| However, nothing in the article articulates the bases for these concerns. |
| Instead, the piece promotes the "hacker as demon" mystique quite creatively. |
|
|
| The use of terms such as "new hoods on the block," "playground bullies," and |
| "hacker hoods" suggests that the purpose of the story was to find facts to fit |
| a slant. |
|
|
| In one sense, the authors might be able to claim that some of their "facts" |
| were accurate. For example, the "playground bullies" phrase is attributed to |
| Cheshire Catalyst. "Gee, *we* didn't say it!" But, they don't identify |
| whether it's the original CC or not. The phrase sounds like a term used in |
| recent internecine "hacker group" bickering, and if this was the context, it |
| hardly describes any new "hacker culture." Even so, the use of the phrase |
| would be akin to a critic of the Forbes article referring to it as the product |
| of "media whores who are now getting paid for doing what they used to do for |
| free," and then applying the term "whores" to the authors because, hey, I |
| didn't make up the term, somebody else did, and I'm just reporting (and using |
| it as my central metaphor) just the way it was told to me. However, I suspect |
| that neither Forbes' author would take kindly to being called a whore because |
| of the perception that they prostituted journalistic integrity for the pay-off |
| of a sexy story. And this is what's wrong with the article: The authors take |
| rumors and catch-phrases, "merely report" the phrases, but then construct |
| premises around the phrases *as if* they were true with little (if any) |
| evidence. They take an unconfirmed "truth" (where are fact checkers when you |
| need them) or an unrelated "fact" (such as an example of insider fraud) and |
| generalize from a discrete fact to a larger population. The article is an |
| excellent bit of creative writing. |
|
|
|
|
| Why Does It All Matter? |
|
|
| Computer crime is serious, costly, and must not be tolerated. Rip-off is no |
| joke. But, it helps to understand a problem before it can be solved, and lack |
| of understanding can lead to policies and laws that are not only ineffective, |
| but also a threat to civil liberties. The public should be accurately informed |
| of the dangers of computer crime and how it can be prevented. However, little |
| will be served by creating demons and falsely attributing to them the sins of |
| others. It is bad enough that the meaning" of the term "hacker" has been used |
| to apply both to both computer delinquents and creative explorers without also |
| having the label extended to include all other forms of computer criminals as |
| well. |
|
|
| CPSR, the EFF, CuD, and many, many others have worked, with some success, to |
| educate the media about both dangers of computer crime and the dangers of |
| inaccurately reporting it and attributing it to "hackers." Some, perhaps most, |
| reporters take their work seriously, let the facts speak to them, and at least |
| make a good-faith effort not to fit their "facts" into a narrative that--by one |
| authors' indication at least -- seems to have been predetermined. |
|
|
| Contrary to billing, there was no evidence in the story, other than |
| questionable rumor, of "hacker" connection to organized crime. Yet, this type |
| of article has been used by legislators and some law enforcement agents to |
| justify a "crackdown" on conventional hackers as if they were the ultimate |
| menace to society. Forbes, with a paid circulation of over 735,000 (compared |
| to CuDs unpaid circulation of only 40,000), reaches a significant and |
| influential population. Hysterical stories create hysterical images, and these |
| create hysteria-based laws that threaten the rights of law-abiding users. When |
| a problem is defined by irresponsibly produced images and then fed to the |
| public, it becomes more difficult to overcome policies and laws that restrict |
| rights in cyberspace. |
|
|
| The issue is not whether "hackers" are or are not portrayed favorably. Rather, |
| the issue is whether images reinforce a witch-hunt mentality that leads to the |
| excesses of Operation Sun Devil, the Steve Jackson Games fiasco, or excessive |
| sentences for those who are either law-abiding or are set up as scapegoats. |
| The danger of the Forbes article is that it contributes to the persecution of |
| those who are stigmatized not so much for their acts, but rather for the signs |
| they bear. |
|
|