| ==Phrack Magazine== |
|
|
| Volume Five, Issue Forty-Five, File 20 of 28 |
|
|
| **************************************************************************** |
|
|
| The Senator Markey Hearing Transcripts |
|
|
| [To obtain your own copy of this hearing and the other related ones, |
| contact the U.S. Government Printing Office (202-512-0000) and ask |
| for Serial No. 103-53, known as "Hearings Before The Subcommittee |
| on Telecommunications and Finance of the Committee on Energy and |
| Commerce, House of Representatives, One Hundred Third Congress, |
| First Session, April 29 and June 9, 1993".] |
|
|
| ---------------------------------------------------------------------- |
|
|
| Mr. MARKEY. If you could close the door, please, we could move |
| on to this very important panel. It consists of Mr. Donald Delaney, |
| who is a senior investigator for the New York State Police. Mr. |
| Delaney has instructed telecommunications fraud at the Federal Law |
| Enforcement Training Center and has published chapters on computer |
| crime and telecommunications fraud. Dr. Peter Tippett is an expert |
| in computer viruses and is the director of security products for |
| Symantec Corporation in California. Mr. John J. Haugh is chairman |
| of Telecommunications Advisors Incorporated, a telecommunications |
| consulting firm in Portland, Oreg., specializing in network |
| security issues. Dr. Haugh is the editor and principal author of |
| two volumes entitled "Toll Fraud" and "Telabuse" in a newsletter |
| entitled "Telecom and Network Security Review." Mr. Emmanuel |
| Goldstein is the editor-in-chief of "2600: The Hacker Quarterly." |
| Mr. Goldstein also hosts a weekly radio program in New York called |
| "Off The Hook." Mr. Michael Guidry is chairman and founder of the |
| Guidry Group, a security consulting firm specializing in |
| telecommunications issues. The Guidry Group works extensively with |
| the cellular industry in its fight against cellular fraud. |
| We will begin with you, Mr. Delaney, if we could. You each |
| have 5 minutes. We will be monitoring that. Please try to abide by |
| the limitation. Whenever you are ready, please begin. |
| STATEMENTS OF DONALD P. DELANEY, SENIOR INVESTIGATOR, NEW YORK |
| STATE POLICE; JOHN J. HAUGH, CHAIRMAN, TELECOMMUNICATIONS ADVISORS; |
| EMMANUEL GOLDSTEIN, PUBLISHER, 2600 MAGAZINE; PETER S. TIPPETT, |
| DIRECTOR, SECURITY AND ENTERPRISE PRODUCTS, SYMANTEC CORP.; AND |
| MICHAEL A. GUIDRY, CHIEF EXECUTIVE OFFICER, THE GUIDRY GROUP |
| Mr. DELANEY. Thank you, Mr. Chairman, for the invitation to |
| testify today. |
| As a senior investigator with the New York State Police, I |
| have spent more than 3 years investigating computer crime and |
| telecommunications fraud. I have executed more than 30 search |
| warrants and arrested more than 30 individuals responsible for the |
| entire spectrum of crime in this area. |
| I authored two chapters in the "Civil and Criminal |
| Investigating Handbook" published by McGraw Hill entitled |
| "Investigating Computer Crime and Investigating Telecommunications |
| Fraud." Periodically I teach a 4-hour block instruction on |
| telecommunications fraud at the Federal Law Enforcement Training |
| Center in Georgia. |
| Although I have arrested some infamous teenagers, such as |
| Phiber Optic, ZOD, and Kong, in some cases the investigations were |
| actually conducted by the United States Secret Service. Because |
| Federal law designates a juvenile as one less than 18 years of age |
| and the Federal system has no means of prosecuting a juvenile, |
| malicious hackers, predominately between 13 and 17 years of age, |
| are either left unprosecuted or turned over to local law |
| enforcement. In some cases, local law enforcement were either |
| untrained or unwilling to investigate the high-tech crime. |
| In examining telecommunications security, one first realizes |
| that all telecommunications is controlled by computers. Computer |
| criminals abuse these systems not only for free service but for a |
| variety of crimes ranging from harassment to grand larceny and |
| illegal wiretapping. Corporate and Government espionage rely on the |
| user-friendly networks which connect universities, military |
| institutions, Government offices, corporate research and |
| development computers. Information theft is common from those |
| companies which hold our credit histories. Their lack of security |
| endanger each of us, but they are not held accountable. |
| One activity which has had a financial impact on everyone |
| present is the proliferation of call sell operations. Using a |
| variety of methods, such as rechipped cellular telephones, |
| compromised PBX remote access units, or a combination of cellular |
| phone and international conference lines, the entrepreneur deprives |
| the telephone companies of hundreds of millions of dollars each |
| year. These losses are passed on to each of us as higher rates. |
| The horrible PBX problem exists because a few dozen finger |
| hackers crack the codes and disseminate them to those who control |
| the pay phones. The major long distance carriers each have the |
| ability to monitor their 800 service lines for sudden peaks in use. |
| A concerted effort should be made by the long distance carriers to |
| identify the finger hackers, have the local telephone companies |
| monitor the necessary dialed number recorders, and provide local |
| law enforcement with timely affidavits. Those we have arrested for |
| finger hacking the PBX's have not gone back into this type of |
| activity or crime. |
| The New York State Police have four newly trained |
| investigators assigned to investigate telecommunications fraud in |
| New York City alone. One new program sponsored by AT&T is |
| responsible for having trained police officers from over 75 |
| departments about this growing blight in New York State alone. |
| Publications, such as "2600," which teach subscribers how to |
| commit telecommunications crime are protected by the First |
| Amendment, but disseminating pornography to minors is illegal. In |
| that many of the phone freaks are juveniles, I believe legislation |
| banning the dissemination to juveniles of manuals on how to commit |
| crime would be appropriate. |
| From a law enforcement perspective, I applaud the proposed |
| Clipper chip encryption standard which affords individuals |
| protection of privacy yet enables law enforcement to conduct |
| necessary court-ordered wiretaps, and with respect to what was |
| being said in the previous conversation, last year there were over |
| 900 court-ordered wiretaps in the United States responsible for the |
| seizure of tons of illicit drugs coming into this country, solving |
| homicides, rapes, kidnappings. If we went to an encryption standard |
| without the ability for law enforcement to do something about it, |
| we would have havoc in the United States -- my personal opinion. |
| In New York State an individual becomes an adult at 16 years |
| old and can be prosecuted as such, but if a crime being |
| investigated is a Federal violation he must be 18 years of age to |
| be prosecuted. Even in New York State juveniles can be adjudicated |
| and given relevant punishment, such as community service. |
| I believe that funding law enforcement education programs |
| regarding high-tech crime investigations, as exists at the Federal |
| Law Enforcement Training Center's Financial Frauds Institute, is |
| one of the best tools our Government has to protect its people with |
| regard to law enforcement. |
| Thank you. |
| Mr. WYDEN [presiding]. Thank you very much for a very helpful |
| presentation. |
| Let us go next to Mr. Haugh. |
| We welcome you. It is a pleasure to have an Oregonian, |
| particularly an Oregonian who has done so much in this field, with |
| the subcommittee today. I also want to thank Chairman Markey and |
| his excellent staff for all their efforts to make your attendance |
| possible today. |
| So, Mr. Haugh, we welcome you, and I know the chairman is |
| going to be back here in just a moment. |
| STATEMENT OF JOHN J. HAUGH |
| Mr. HAUGH. Thank you, Mr. Wyden. |
| We expended some 9,000 hours, 11 different people, researching |
| the problem of toll fraud, penetrating telecommunications systems, |
| and then stealing long distance, leading up to the publication of |
| our two-volume reference work in mid-1992. We have since spent |
| about 5,000 additional hours continuing to monitor the problem, and |
| we come to the table with a unique perspective because we are |
| vender, carrier, and user independent. |
| In the prior panel, the distinguished gentleman from AT&T, for |
| whom I have a lot of personal respect, made the comment that the |
| public justifiably is confident that the national wire network is |
| secure and that the problem is wireless. With all due respect, that |
| is a laudable goal, but as far as what is going on today, just |
| practical reality, that comment is simply incorrect, and if the |
| public truly is confident that the wired network is secure, that |
| confidence is grossly misplaced. |
| We believe 35,000 users will become victimized by toll fraud |
| this year, 1993. We believe the national problem totals somewhere |
| between $4 and $5 billion. It is a very serious national problem. |
| We commend the chairman and this committee for continuing to |
| attempt to draw public attention and focus on the problem. |
| The good news, as we see it, over the last 3 years is that the |
| severity of losses has decreased. There is better monitoring, |
| particularly on the part of the long distance carriers, there is |
| more awareness on the part of users who are being more careful |
| about monitoring and managing their own systems, as a result of |
| which the severity of loss is decreasing. That is the good news. |
| The bad news is that the frequency is greatly increasing, so |
| while severity is decreasing, frequency is increasing, and I will |
| give you some examples. In 1991 we studied the problem from 1988 to |
| 1991 and concluded that the average toll fraud loss was $168,000. |
| We did a national survey from November of last year to March of |
| this year, and the average loss was $125,000, although it was |
| retrospective. Today we think the average loss is $30,000 to |
| $60,000, which shows a rather dramatic decline. |
| The problem is, as the long distance thieves, sometimes called |
| hackers, are rooted out of one system, one user system, they |
| immediately hop into another one. So severity is dropping, but |
| frequency is increasing. Everybody is victimized. You have heard |
| business users with some very dramatic and very sad tales. The |
| truth is that everybody is victimized; the users are victimized; |
| the long distance carriers are victimized; the cellular carriers |
| are victimized, the operator service providers; the co-cod folks, |
| the aggregators and resellers are victimized; the LEC's and RBOC's, |
| to a limited extent, are victimized; and the vendors are victimized |
| by being drawn into the problem. |
| Who is at fault? Everybody is at fault. The Government is at |
| fault. The FCC has taken a no-action, apathetic attitude toward |
| toll fraud. That Agency is undermanned, it is understaffed, it is |
| underfunded, it has difficult problems -- no question about that -- |
| but things could and should be done by that Agency that have not |
| been done. |
| The long distance carriers ignored the problem for far too |
| long, pretended that they could not monitor when, in fact, the |
| technology was available. They have done an outstanding job over |
| the last 2 years of getting with it and engaging themselves fully, |
| and I would say the long distance carriers, at the moment, are |
| probably the best segment of anyone at being proactive to take care |
| of the problem. |
| Users too often ignored security, ignored their user manuals, |
| failed to monitor, failed to properly manage. There has been |
| improvement which has come with the public knowledge of the |
| problem. CPE venders, those folks who manufactured the systems that |
| are so easy to penetrate, have done an abysmally poor job of |
| engineering into the systems security features. They have ignored |
| security. Their manuals didn't deal with security. They are |
| starting to now. They are doing a far better job. More needs to be |
| done. |
| The FCC, in particular, needs to become active. This committee |
| needs to focus more attention on the problem, jawbone, keep the |
| heat on the industry, the LEC's and the RBOC's in particular. The |
| LEC's and the RBOC's have essentially ignored the problem. They are |
| outside the loop, they say, yet the LEC's and the RBOC's collected |
| over $21 billion last year in access fees for connecting their |
| users to the long distance networks. How much of that $21 billion |
| did the LEC's and the RBOC's reinvest in helping to protect their |
| users from becoming victimized and helping to combat user-targeted |
| toll fraud? No more than $10 million, one-fifth of 1 percent. |
| Many people in the industry feel the LEC's and the RBOC's are |
| the one large group that has yet to seriously come to the table. |
| Many in the industry -- and we happen to agree -- feel that 3 to 4 |
| percent of those access fees should be reinvested in protecting |
| users from being targeted by the toll fraud criminals. |
| The FCC should become more active. The jawboning there is at |
| a minimal level. There was one show hearing last October, lots of |
| promises, no action, no regulation, no initiatives, no meetings. A |
| lot could be done. Under part 68, for example, the FCC, which is |
| supposed to give clearance to any equipment before it is connected |
| into the network, they could require security features embedded |
| within that equipment. They could prevent things like low-end PBX's |
| from being sold with three-digit barrier codes that anyone can |
| penetrate in 3 to 5 minutes. |
| Thank you, Mr. Chairman. |
| Mr. MARKEY. THANK YOU, MR. HAUGH, VERY MUCH. |
| Mr. Goldstein, let's go to you next. |
| STATEMENT OF EMMANUEL GOLDSTEIN |
| Mr. GOLDSTEIN. Thank you, Mr. Chairman, and thank you to this |
| committee for allowing me the opportunity to speak on behalf of |
| those who, for whatever reason, have no voice. |
| I am in the kind of unique position of being in contact with |
| those people known as computer hackers throughout the world, and I |
| think one of the misconceptions that I would like to clear up, that |
| I have been trying to clear up, is that hackers are analogous to |
| criminals. This is not the case. I have known hundreds of hackers |
| over the years, and a very, very small percentage of them are |
| interested in any way in committing any kind of a crime. I think |
| the common bond that we all have is curiosity, an intense form of |
| curiosity, something that in many cases exceeds the limitations |
| that many of us would like to put on curiosity. The thing is |
| though, you cannot really put a limitation on curiosity, and that |
| is something that I hope we will be able to understand. |
| I like to parallel the hacker culture with any kind of alien |
| culture because, as with any alien culture, we have difficulty |
| understanding its system of values, we have difficulty |
| understanding what it is that motivates these people, and I hope to |
| be able to demonstrate through my testimony that hackers are |
| friendly people, they are curious people, they are not out to rip |
| people off or to invade people's privacy; actually, they are out to |
| protect those things because they realize how valuable and how |
| precious they really are. |
| I like to draw analogies to where we are heading in the world |
| of high technology, and one of the analogies I have come up with is |
| to imagine yourself speeding down a highway, a highway that is |
| slowly becoming rather icy and slippery, and ask yourself the |
| question of whether or not you would prefer to be driving your own |
| car or to be somewhere inside a large bus, and I think that is kind |
| of the question we have to ask ourselves now. Do we want to be in |
| control of our own destiny as far as technology goes, or do we want |
| to put all of our faith in somebody that we don't even know and |
| maybe fall asleep for a little while ourselves and see where we |
| wind up? It is a different answer for every person, but I think we |
| need to be able to at least have the opportunity to choose which it |
| is that we want to do. |
| Currently, there is a great deal of suspicion, a great deal of |
| resignation, hostility, on behalf of not simply hackers but |
| everyday people on the street. They see technology as something |
| that they don't have any say in, and that is why I particularly am |
| happy that this committee is holding this hearing, because people, |
| for the most part, see things happening around them, and they |
| wonder how it got to that stage. They wonder how credit files were |
| opened on them; they wonder how their phone numbers are being |
| passed on through A&I and caller ID. Nobody ever went to these |
| people and said, "Do you want to do this? Do you want to change the |
| rules?" |
| The thing that hackers have learned is that any form of |
| technology can and will be abused, whether it be calling card |
| numbers or the Clipper chip. At some point, something will be |
| abused, and that is why it is important for people to have a sense |
| of what it is that they are dealing with and a say in the future. |
| I think it is also important to avoid inequities in access to |
| technology, to create a society of haves and have-nots, which I |
| feel we are very much in danger of doing to a greater extent than |
| we have ever done before. A particular example of this involves |
| telephone companies, pay phones to be specific. Those of us who can |
| make a telephone call from, say, New York to Washington, D.C., at |
| the cheapest possible rate from the comfort of our own homes will |
| pay about 12 cents for the first minute. However, if you don't have |
| a phone or if you don't have a home, you will be forced to pay |
| $2.20 for that same first minute. |
| What this has led to is the proliferation of what are known as |
| red boxes. I have a sample (indicating exhibit). Actually, this is |
| tremendously bigger than it needs to be. A red box can be about a |
| tenth of the size of this. But just to demonstrate the sound that |
| it takes for the phone company to believe that you have put a |
| quarter into the phone (brief tone is played), that is it, that is |
| a quarter. |
| Now we can say this is the problem, this huge demonic device |
| here is what is causing all the fraud, but it is not the case. This |
| tape recorder here (same brief tone is played) does the same thing. |
| So now we can say the tones are the problem, we can make tones |
| illegal, but that is going to be very hard to enforce. |
| I think what we need to look at is the technology itself: Why |
| are there gaping holes in them? and why are we creating a system |
| where people have to rip things off in order to get the same access |
| that other people can get for virtually nothing? |
| I think a parallel to that also exists in the case of cellular |
| phones. I have a device here (indicating exhibit) which I won't |
| demonstrate, because to do so would be to commit a Federal crime, |
| but by pressing a button here within the course of 5 seconds we |
| will be able to hear somebody's private, personal cellular phone |
| call. |
| Now the way of dealing with privacy with cellular phone calls |
| is to make a law saying that it is illegal to listen. That is the |
| logic we have been given so far. I think a better idea would be to |
| figure out a way to keep those cellular phone calls private and to |
| allow people to exercise whatever forms of privacy they need to |
| have on cellular phone calls. |
| So I think we need to have a better understanding both from |
| the legislative point of view and in the general public as far as |
| technology in itself, and I believe we are on the threshold of a |
| very positive, enlightened period, and I see that particularly with |
| things like the Internet which allow people access to millions of |
| other people throughout the world at very low cost. I think it is |
| the obligation of all of us to not stand in the way of this |
| technology, to allow it to go forward and develop on its own, and |
| to keep a watchful eye on how it develops but at the same time not |
| prevent it through overlegislation or overpricing. |
| Thank you very much for the opportunity to speak. |
| Mr. MARKEY. Thank you, Mr. Goldstein. |
| Dr. Tippett. |
| STATEMENT OF PETER S. TIPPETT |
| Mr. TIPPET. Thank you. |
| I am Peter Tippett from Symantec Corporation, and today I am |
| also representing the National Computer Security Association and |
| the Computer Ethics Institute. Today is Computer Virus Awareness |
| Day, in case you are not aware, and we can thank Jack Fields, |
| Representative Fields, for sponsoring that day on behalf of the |
| Congress, and I thank you for that. |
| We had a congressional briefing this morning in which nine |
| representatives from industry, including telecommunications and |
| aerospace and the manufacturing industry, convened, and for the |
| first time were willing to talk about their computer virus problems |
| in public. I have got to tell you that it is an interesting |
| problem, this computer virus problem. It is a bit different from |
| telephone fraud. The virus problem is one which has probably among |
| the most misrepresentation and misunderstanding of these various |
| kinds of fraud that are going on, and I would like to highlight |
| that a little bit. But before I do, I would like to suggest what we |
| know to be the costs of computer viruses just in America. |
| The data I am representing comes from IBM and DataQuest, a |
| Dunn and Bradstreet company, it is the most conservative |
| interpretation you could make from this data. It suggests that a |
| company of only a thousand computers has a virus incident every |
| quarter, that a typical Fortune 500 company deals with viruses |
| every month, that the cost to a company with only a thousand |
| computers is about $170,000 a year right now and a quarter of a |
| million dollars next year. If we add these costs up, we know that |
| the cost to United States citizens of computer viruses just so far, |
| just since 1990, exceeds $1 billion. |
| When I go through these sorts of numbers, most of us say, |
| well, that hype again, because the way the press and the way we |
| have heard about computer viruses has been through hype oriented |
| teachings. So the purpose here is not to use hype and not to sort |
| of be alarmist and say the world is ending, because the world isn't |
| ending per se, but to suggest that there isn't a Fortune 500 |
| company in the United States who hasn't had a computer virus |
| problem is absolutely true, and the sad truth about these viruses |
| is that the misconceptions are keeping us from doing the right |
| things to solve the problem, and the misconceptions stem from the |
| fact that companies that are hit by computer viruses, which is |
| every company, refused to talk about that until today. |
| There are a couple of other unique things and misconceptions |
| about computer viruses. One is that bulletin boards are the leading |
| source of computer viruses. Bulletin boards represent the infancy |
| of the superhighway, I think you could say, and there are a lot of |
| companies that make rules in their company that you are not allowed |
| to use bulletin boards because you might get a virus. In fact, it |
| is way in the low, single-digit percents. It may be as low as 1 |
| percent of computer viruses that are introduced into companies come |
| through some route via a bulletin board. |
| We are told that some viruses are benign, and, in fact, most |
| people who write computer viruses think that their particular virus |
| is innocuous and not harmful. It turns out that most virus authors, |
| as we just heard from Mr. Goldstein, are, in fact, curious people |
| and not malicious people. They are young, and they are challenged, |
| and there is a huge game going on in the world. There is a group of |
| underground virus bulletin boards that we call virus exchange |
| bulletin boards in which people are challenged to write viruses. |
| The challenge works like this: If you are interested and |
| curious, you read the threads of communication on these bulletin |
| boards, and they say, you know, "If you want to download some |
| viruses, there's a thousand here on the bulletin board free for |
| your downloading," but you need points. Well, how do you get |
| points? Well, you upload some viruses. Well, where do you get some |
| viruses from? If you upload the most common viruses, they are not |
| worth many points, so you have to upload some really good, juicy |
| viruses. Well, the only way to get those is to write them, so you |
| write a virus and upload your virus, and then you gain acceptance |
| into the culture, and when you gain acceptance into the culture you |
| have just added to the problem. |
| It is interesting to know that the billion dollars that we |
| have spent since 1990 on computer viruses just in the United States |
| is due to viruses that were written in 1988 and 1987. Back then, we |
| only had one or two viruses a quarter, new, introduced into the |
| world. This year we have a thousand new computer viruses introduced |
| into our community, and it won't be for another 4 or 5 years before |
| these thousand viruses that are written now will become the major |
| viruses that hurt us in the future. |
| So virus authors don't believe they are doing anything wrong, |
| they don't believe that they are being harmful, and they don't |
| believe that what they do is dangerous, and, in fact, all viruses |
| are. |
| Computer crime laws don't have anything to do with computer |
| virus writers, so we heard testimony this morning from Scott |
| Charney of the Department of Justice who suggested that authorized |
| access is the biggest law you could use, and, in fact, most viruses |
| are brought into our organizations in authorized ways, because |
| users who are legitimate in the organizations accidentally bring |
| these things in, and then they infect our companies. |
| In summary, I think that we need to add a little bit of |
| specific wording in our computer crime legislation that relates |
| particularly to computer viruses and worms. We need, in particular, |
| to educate. We need to go after an ethics angle. We need to get to |
| the point where Americans think that writing viruses or doing these |
| other kinds of things that contaminate our computer superhighways |
| are akin to contaminating our expressways. |
| In the sixties we had a big "Keep America Beautiful" campaign, |
| and most Americans would find it unthinkable to throw their garbage |
| out the window of their car, but we don't think it unthinkable to |
| write rogue programs that will spread around our highway. |
| Thank you. |
| Mr. MARKEY. Thank you, Dr. Tippett. |
| Mr. Guidry. |
| STATEMENT OF MICHAEL A. GUIDRY |
| Mr. GUIDRY. Thank you, Mr. Chairman, for giving me the |
| opportunity to appear before this subcommittee, and thank you, |
| subcommittee, for giving me this opportunity. |
| The Guidry Group is a Houston-based security consulting firm |
| specializing in telecommunication issues. We started working in |
| telecommunication issues in 1987 and started working specifically |
| with the cellular industry at that time. When we first started, we |
| were working with the individual carriers across the United States, |
| looking at the hot points where fraud was starting to occur, which |
| were major metropolitan cities of course. |
| In 1991, the Cellular Telephone Industry Association contacted |
| us and asked us to work directly with them in their fight against |
| cellular fraud. The industry itself has grown, as we all know, |
| quite rapidly. However, fraud in the industry has grown at an |
| unbelievable increase, actually faster than the industry itself, |
| and as a result of that fraud now is kind of like a balloon, a |
| water balloon; it appears in one area, and when we try to stamp it |
| out it appears in another area. |
| As a result, what has happened is, when fraud first started, |
| there was such a thing as subscription fraud, the same type of |
| fraud that occurred with the land line telecommunication industry. |
| That subscription fraud quickly changed. Now what has occurred is, |
| technology has really stepped in. |
| First, hackers, who are criminals or just curious people, |
| would take a telephone apart, a cellular phone apart, and change |
| the algorithm on the chip, reinsert the chip into the telephone, |
| and cause that telephone to tumble. Well, the industry put its best |
| foot forward and actually stopped, for the most part, the act of |
| tumbling in cellular telephones. But within the last 18 months |
| something really terrible has happened, and that is cloning. |
| Cloning is the copying of the MIN and and ESN number, and, for |
| clarification, the MIN is the Mobile Identification Number that is |
| assigned to you by the carrier, and the ESN number is the |
| Electronic Cellular Number that is given to the cellular telephone |
| from that particular manufacturer. As a result, now we have |
| perpetrators, or just curious people, finding ways to copy the MIN |
| and the ESN, thereby victimizing the cellular carrier as well as |
| the good user, paying subscriber. This occurs when the bill is |
| transmitted by the carrier to the subscriber and he says something |
| to the effect of, "I didn't realize that I had made $10,000 worth |
| of calls to the Dominican Republic," or to Asia or Nicaragua or |
| just any place like that. |
| Now what has happened is, those clone devices have been placed |
| in the hands of people that we call ET houses, I guess you would |
| say, and they are the new immigrants that come into the United |
| States for the most part that do not have telephone subscriptions |
| on the land line or on the carrier side from cellular, and now they |
| are charged as much as $25 for 15 minutes to place a call to their |
| home. |
| Unfortunately, though, the illicit behavior of criminals has |
| stepped into this network also. Now we have gang members, drug |
| dealers, and gambling, prostitution, vice, just all sorts of crime, |
| stepping forward to use this system where, by using the cloning, |
| they are avoiding law enforcement. Law enforcement has problems, of |
| course, trying to find out how to tap into those telephone systems |
| and record those individuals. |
| Very recently, cloning has even taken a second step, and that |
| is now something that we term the magic phone, and the magic phone |
| works like this: Instead of cloning just one particular number, it |
| clones a variety of numbers, as many as 14 or 66, thereby |
| distributing the fraud among several users, which makes it almost |
| virtually impossible for us to detect at an early stage. |
| In response to this, what has happened? A lot of legitimate |
| people have started to look at using the illegitimate cellular |
| services. They are promised that this is a satellite phone or just |
| a telephone that if they pay a $2,500 fee will avoid paying further |
| bills. So now it has really started to spread. |
| Some people in major metropolitan areas, such as the |
| Southwest, Northeast, and Southeast, have started running their own |
| mini-cellular companies by distributing these cloning phones to |
| possible clients and users, collecting the fee once a month to |
| reactivate the phone if it is actually denied access. |
| The cellular industry has really stepped up to the plate I |
| think the best they can right now in trying to combat this by |
| working with the switch manufacturers and other carriers, 150 of |
| them to date with the cellular telephone industry, as well as the |
| phone manufacturers, and a lot of companies have started looking at |
| software technology. However, these answers will not come to pass |
| very soon. What we must have is strong legislation. |
| We have been working for the last 18 months, specifically with |
| the Secret Service and a lot of local, State, and Federal law |
| enforcement agencies. The Service has arrested over 100 people |
| involved in cellular fraud. We feel very successful about that. We |
| also worked with local law enforcement in Los Angeles to form the |
| L.A. Blitz, and we arrested an additional 26 people and seized 66 |
| illegal telephones and several computers that spread this cloning |
| device. |
| However, now we have a problem. U.S. Title 18, 1029, does not |
| necessarily state cellular or wireless. It is very important, and |
| I pray that this committee will look at revising 1029 and changing |
| it to include wireless and cellular. I think wireless |
| communications, of course, like most people, is the wave of the |
| future, and it is extremely important that we include that in the |
| legislation so that when people are apprehended they can be |
| prosecuted. |
| Thank you, sir. |
| Mr. MARKEY. Thank you, Mr. Guidry, very much. |
| We will take questions now from the subcommittee members. |
| Let me begin, Mr. Delaney. I would like you and Mr. Goldstein |
| to engage in a conversation, if we could. This is Mr. Goldstein's |
| magazine, "The Hacker Quarterly: 2600," and for $4 we could go out |
| to Tower Records here in the District of Columbia and purchase |
| this. It has information in it that, from my perspective, is very |
| troubling in terms of people's cellular phone numbers and |
| information on how to crack through into people's private |
| information. |
| Now you have got some problems with "The Hacker Quarterly," |
| Mr. Delaney. |
| Mr. DELANEY. Yes, sir. |
| Mr. MARKEY. And your problem is, among other things, that |
| teenagers can get access to this and go joy riding into people's |
| private records. |
| Mr. DELANEY. Yes, sir. In fact, they do. |
| Mr. MARKEY. Could you elaborate on what that problem is? |
| And then, Mr. Goldstein, I would like for you to deal with the |
| ethical implications of the problem as Mr. Delaney would outline |
| them. |
| Mr. DELANEY. Well, the problem is that teenagers do read the |
| "2600" magazine. I have witnessed teenagers being given free copies |
| of the magazine by the editor-in-chief. I have looked at a |
| historical perspective of the articles published in "2600" on how |
| to engage in different types of telecommunications fraud, and I |
| have arrested teenagers that have read that magazine. |
| The publisher, or the editor-in-chief, does so with impunity |
| under the cloak of protection of the First Amendment. However, as |
| I indicated earlier, in that the First Amendment has been abridged |
| for the protection of juveniles from pornography, I also feel that |
| it could be abridged for juveniles being protected from manuals on |
| how to commit crime -- children, especially teenagers, who are |
| hackers, and who, whether they be mischievous or intentionally |
| reckless, don't have the wherewithal that an adult does to |
| understand the impact of what he is doing when he gets involved in |
| this and ends up being arrested for it. |
| Mr. MARKEY. Mr. Goldstein, how do we deal with this problem? |
| Mr. GOLDSTEIN. First of all, "2600" is not a manual for |
| computer crime. What we do is, we explain how computers work. Very |
| often knowledge can lead to people committing crimes, we don't deny |
| that, but I don't believe that is an excuse for withholding the |
| knowledge. |
| The article on cellular phones that was printed in that |
| particular issue pretty much goes into detail as to how people can |
| track a cellular phone call, how people can listen in, how exactly |
| the technology works. These are all things that people should know, |
| and perhaps if people had known this at the beginning they would |
| have seen the security problems that are now prevalent, and perhaps |
| something could have been done about it at that point. |
| Mr. MARKEY. Well, I don't know. You are being a little bit |
| disingenuous here, Mr. Goldstein. Here, on page 17 of your spring |
| edition of 1993, "How to build a pay TV descrambler." Now that is |
| illegal. |
| Mr. GOLDSTEIN. Not building. Building one is not illegal. |
| Mr. MARKEY. Oh, using one is illegal? |
| Mr. GOLDSTEIN. Exactly. |
| Mr. MARKEY. I see. So showing a teenager, or anyone, how to |
| build a pay TV descrambler is not illegal. But what would they do |
| then, use it as an example of their technological prowess that they |
| know how to build one? Would there not be a temptation to use it, |
| Mr. Goldstein? |
| Mr. GOLDSTEIN. It is a two-way street, because we have been |
| derided by hackers for printing that information and showing the |
| cable companies exactly what the hackers are doing. |
| Mr. MARKEY. I appreciate it from that perspective, but let's |
| go over to the other one. If I am down in my basement building a |
| pay TV descrambler for a week, am I not going to be tempted to see |
| if it works, Mr. Goldstein? Or how is it that I then prove to |
| myself and my friends that I have actually got something here which |
| does work in the real world? |
| Mr. GOLDSTEIN. It is quite possible you will be tempted to try |
| it out. We don't recommend people being fraudulent -- |
| Mr. MARKEY. How do you know that it works, by the way? |
| Mr. GOLDSTEIN. Actually, I have been told by most people that |
| is an old version that most cable companies have gotten beyond. |
| Mr. MARKEY. So this wouldn't work then? |
| Mr. GOLDSTEIN. It will work in some places, it won't work in |
| all places. |
| Mr. MARKEY. Oh, it would work? It would work in some places? |
| Mr. GOLDSTEIN. Most likely, yes. But the thing is, we don't |
| believe that because something could be used in a bad way, that is |
| a reason to stifle the knowledge that goes into it. |
| Mr. MARKEY. That is the only way this could be used. Is there |
| a good way in which a pay TV descrambler could be used that is a |
| legal way? |
| Mr. GOLDSTEIN. Certainly, to understand how the technology |
| works in the first place, to design a way of defeating such devices |
| in the future or to build other electronic devices based on that |
| technology. |
| Mr. MARKEY. I appreciate that, but it doesn't seem to me that |
| most of the subscribers to "2600" magazine -- |
| Mr. GOLDSTEIN. That is interesting that you are pointing to |
| that. That is our first foray into cable TV. We have never even |
| testified on the subject before. |
| Mr. MARKEY. I appreciate that. |
| Well, let's move on to some of your other forays here. What |
| you have got here, it seems to me, is a manual where you go down |
| Maple Street and you just kind of try the door on every home on |
| Maple Street. Then you hit 216 Maple Street, and the door is open. |
| What you then do is, you take that information, and you go down to |
| the corner grocery store, and you post it: "The door of 216 Maple |
| is open." |
| Now, of course, you are not telling anyone to steal, and you |
| are not telling anyone that they should go into 216 Maple. You are |
| assuming that everyone is going to be ethical who is going to use |
| this information, that the house at 216 Maple is open. But the |
| truth of the matter is, you have got no control at this point over |
| who uses that information. Isn't that true, Mr. Goldstein? |
| Mr. GOLDSTEIN. The difference is that a hacker will never |
| target an individual person as a house or a personal computer or |
| something like that. What a hacker is interested in is wide open, |
| huge data bases that contain information about people, such as TRW. |
| A better example, I feel, would be one that we tried to do 2 |
| years ago where we pointed out that the Simplex Lock Corporation |
| had a very limited number of combinations on their hardware locks |
| that they were trying to push homeowners to put on their homes, and |
| we tried to alert everybody as to how insecure these are, how easy |
| it is to get into them, and people were not interested. |
| Hackers are constantly trying to show people how easy it is to |
| do certain things. |
| Mr. MARKEY. I appreciate what you are saying. From one |
| perspective, you are saying that hackers are good people out there, |
| almost like -- what are they called? -- the Angels that patrol the |
| subways of New York City. |
| Mr. GOLDSTEIN. Guardian Angels. I wouldn't say that though. |
| Mr. MARKEY. Yes, the Guardian Angels, just trying to protect |
| people. |
| But then Mr. Delaney here has the joy riders with the very |
| same information they have taken off the grocery store bulletin |
| board about the fact that 216 Maple is wide open, and he says we |
| have got to have some laws on the books here to protect against it. |
| So would you mind if we passed, Mr. Goldstein, trespassing |
| laws that if people did, in fact, go into 216 and did do something |
| wrong, that we would be able to punish them legally? Would you have |
| a problem with that? |
| Mr. GOLDSTEIN. I would be thrilled if computer trespassing |
| laws were enforced to the same degree as physical trespassing laws, |
| because then you would not have teenage kids having their doors |
| kicked in by Federal marshals and being threatened with $250,000 |
| fines, having all their computer equipment taken and having guns |
| pointed at them. You would have a warning, which is what you get |
| for criminal trespass in the real world, and I think we need to |
| balance out the real world -- |
| Mr. MARKEY. All right. So you are saying, on the one hand, you |
| have a problem that you feel that hackers are harassed by law |
| enforcement officials and are unduly punished. We will put that on |
| one side of the equation. But how about the other side? How about |
| where hackers are violating people's privacy? What should we do |
| there, Mr. Goldstein? |
| Mr. GOLDSTEIN. When a hacker is violating a law, they should |
| be charged with violating a particular law, but that is not what I |
| see today. I see law enforcement not having a full grasp of the |
| technology. A good example of this was raids on people's houses a |
| couple of years ago where in virtually every instance a Secret |
| Service agent would say, "Your son is responsible for the AT&T |
| crash on Martin Luther King Day," something that AT&T said from the |
| beginning was not possible. |
| Mr. MARKEY. Again, Mr. Goldstein, I appreciate that. Let's go |
| to the other side of the problem, the joy rider or the criminal |
| that is using this information. What penalties would you suggest to |
| deal with the bad hacker? Are there bad hackers? |
| Mr. GOLDSTEIN. There are a few bad hackers. I don't know any |
| myself, but I'm sure there are. |
| Mr. MARKEY. I assume if you knew any, you would make sure we |
| did something about them. But let's just assume there are bad |
| people subscribing. What do we do about the bad hacker? |
| Mr. GOLDSTEIN. Well, I just would like to clarify something. |
| We have heard here in testimony that there are gang members and |
| drug members who are using this technology. Now, are we going to |
| define them as hackers because they are using the technology? |
| Mr. MARKEY. Yes. Well, if you want to give them another name, |
| fine. We will call them hackers and crackers, all right? |
| Mr. GOLDSTEIN. I think we should call them criminals. |
| Mr. MARKEY. So the crackers are bad hackers, all right? If you |
| want another word for them, that is fine, but you have got the |
| security of individuals decreasing with the sophistication of each |
| one of these technologies, and the crackers are out there. What do |
| we do with the crackers who buy your book? |
| Mr. GOLDSTEIN. I would not call them crackers. They are |
| criminals. If they are out there doing something for their own |
| benefit, selling information -- |
| Mr. MARKEY. Criminal hackers. What do we do with them? |
| Mr. GOLDSTEIN. There are existing laws. Stealing is still |
| stealing. |
| Mr. MARKEY. OK. Fine. |
| Dr. Tippett. |
| Mr. TIPPETT. I think that the information age has brought on |
| an interesting dilemma that I alluded to earlier. The dilemma is |
| that the people who use computers don't have parents who used |
| computers, and therefore they didn't get the sandbox training on |
| proper etiquette. They didn't learn you are not supposed to spit in |
| other people's faces or contaminate the water that we drink, and we |
| have a whole generation now of 100 million in the United States |
| computer users, many of whom can think this through themselves, |
| but, as we know, there is a range of people in any group, and we |
| need to point out the obvious to some people. It may be the bottom |
| 10 percent. |
| Mr. MARKEY. What the problem is, of course, is that the |
| computer hacker of today doesn't have a computer hacker parent, so |
| parents aren't teaching their children how to use their computers |
| because parents don't know how to use computers. So what do we do? |
| Mr. TIPPETT. It is incumbent upon us to do the same kind of |
| thing we did in the sixties to explain that littering wasn't right. |
| It is incumbent upon us to take an educational stance and for |
| Congress to credit organizations, maybe through a tax credit or |
| through tax deductions, for taking those educational opportunities |
| and educating the world of people who didn't have sandbox training |
| what is good and what is bad about computing. |
| So at least the educational part needs to get started, because |
| I, for one, think that probably 90 percent of the kids -- most of |
| the kids who do most of the damage that we have all described up |
| here, in fact, don't really believe they are doing any damage and |
| don't have the concept of the broadness of the problem that they |
| are doing. The 10 percent of people who are criminal we could go |
| after potentially from the criminal aspect, but the rest we need to |
| get after from a plain, straight ahead educational aspect. |
| Mr. MARKEY. I appreciate that. |
| I will just say in conclusion -- and this is for your benefit, |
| Mr. Goldstein. When you pass laws, you don't pass laws for the good |
| people. What we assume is that there are a certain percent of |
| people -- 5 percent, 10 percent; you pick it -- who really don't |
| have a good relationship with society as a whole, and every law |
| that we pass, for the most part, deals with those people. |
| Now, as you can imagine, when we pass death penalty statutes, |
| we are not aiming it at your mother and my mother. It is highly |
| unlikely they are going to be committing a murder in this lifetime. |
| But we do think there is a certain percentage that will. It is a |
| pretty tough penalty to have, but we have to have some penalty that |
| fits the crime. |
| Similarly here, we assume that there is a certain percentage |
| of pathologically damaged people out there. The cerebral mechanism |
| doesn't quite work in parallel with the rest of society. We have to |
| pass laws to protect the rest of us against them. We will call them |
| criminal hackers. What do we do to deal with them is the question |
| that we are going to be confronted with in the course of our |
| hearings? |
| Let me recognize the gentleman from Texas, Mr. Fields. |
| Mr. FIELDS. Thank you, Mr. Chairman. |
| Just for my own edification, Mr. Goldstein, you appear to be |
| intelligent; you have your magazine, so obviously you are |
| entrepreneurial. For me personally, I would like to know, why don't |
| you channel the curiosity that you talk about into something that |
| is positive for society? And, I'm going to have to say to you, I |
| don't think it is positive when you invade someone else's privacy. |
| Mr. GOLDSTEIN. I agree. |
| Mr. FIELDS. Whether it is an individual or a corporation. |
| Mr. GOLDSTEIN. Well, I would like to ask a question in return |
| then. If I discover that a corporation is keeping a file on me and |
| I access that corporation's computer and find out or tell someone |
| else, whose privacy am I invading? Or is the corporation invading |
| my privacy? |
| You see, corporations are notorious for not volunteering such |
| information: "By the way, we are keeping files on most Americans |
| and keeping track of their eating habits and their sexual habits |
| and all kinds of other things." Occasionally, hackers stumble on to |
| information like that, and you are much more likely to get the |
| truth out of them because they don't have any interest to protect. |
| Mr. FIELDS. Are you saying with this book that is what you are |
| trying to promote? because when I look through this book, I find |
| the same thing that the chairman finds, some things that could |
| actually lead to criminal behavior, and when I see all of these |
| codes regarding cellular telephones, how you penetrate and listen |
| to someone's private conversation, I don't see where you are doing |
| anything for the person, the person who is actually doing the |
| hacking. I see that as an invasion of privacy. |
| Mr. GOLDSTEIN. All right. I need to explain something then. |
| Those are not codes, those are frequencies. Those are frequencies |
| that anybody can listen to, and by printing those frequencies we |
| are demonstrating how easy it is for anybody to listen to them. |
| Now if I say that by tuning to 871 megahertz you can listen to |
| a cellular phone call, I don't think I am committing a crime, I |
| think I am explaining to somebody. What I have done at previous |
| conferences is hold up this scanner and press a button and show |
| people how easy it is to listen, and those people, when they get |
| into their cars later on in the day, they do not use their cellular |
| telephones to make private calls of a personal nature because they |
| have learned something, and that is what we are trying to do, we |
| are trying to show people how easy it is. |
| Now, yes, that information can be used in a bad way, but to |
| use that as an excuse not to give out the information at all is |
| even worse, and I think it is much more likely that things may be |
| fixed, the cellular industry may finally get its act together and |
| start protecting phone calls. The phone companies might make red |
| boxes harder to use or might make it easier for people to afford |
| phone calls, but we will never know if we don't make it public. |
| Mr. FIELDS. I want to be honest with you, Mr. Goldstein. I |
| think it is frightening that someone like you thinks there is a |
| protected right in invading someone else's privacy. |
| Mr. Guidry, let me turn to you. How does a hacker get the |
| codes that you were talking about a moment ago -- if I understood |
| what you were saying correctly, the manual ID number, the other |
| cellular numbers that allow them to clone? |
| Mr. GUIDRY. Well, unfortunately, "2600" would be a real good |
| bet to get those, and we have arrested people and found those |
| manuals in their possession. |
| The other way is quite simply just to what we call dumpster |
| dive, and that is to go to cellular carriers where they may destroy |
| trash. Unfortunately, some of it is shredded and put back together, |
| some of it is not shredded, and kids, criminals, go into those |
| dumpsters, withdraw that information, piece it together, and then |
| experiment with it. That information then is usually sold for |
| criminal activity to avoid prosecution. |
| Mr. FIELDS. You are asking the subcommittee to include |
| wireless and cellular, and I think that is a good recommendation. |
| I think certainly that is one that we are going to take as good |
| counsel. But it appears that much of what you are talking about is |
| organized activity, and my question is, does the current punishment |
| scheme actually fit the crime, or should we also look at increasing |
| punishment for this type of crime? |
| Mr. GUIDRY. I would strongly suggest that we increase the |
| punishment for this sort of crime. It is unfortunate that some |
| hackers take that information and sell it for criminal activity, |
| and, as a result, if prosecution is not stiff enough, then it far |
| outweighs the crime. |
| Mr. FIELDS. What is the punishment now for this type of |
| cellular fraud? |
| Mr. GUIDRY. Right now, it can be as high as $100,000 and up to |
| 20 years in the penitentiary. |
| Mr. FIELDS. Mr. Delaney, do you feel that that is adequate? |
| Mr. DELANEY. Under New York State law, which is what I deal |
| with, as opposed to the Federal law, we can charge a host of |
| felonies with regard to one illicit telephone call if you want to |
| be creative with the law. Sections 1029 and 1039 really cover just |
| about everything other than the cellular concern and the wireless |
| concern. |
| However, I think the thing that is not dealt with is the |
| person who is running the call sell operations. The call selling |
| operations are the biggest loss of revenue to the telephone |
| companies, cellular companies. Whether they are using PBX's or call |
| diverters or cellular phones, this is where all the fraud is coming |
| from, and there is only a handful of people who are originating |
| this crime. |
| We have targeted these people in New York City right now, and |
| the same thing is being done in Los Angeles and Florida, to |
| determine who these people are that use just the telephone to hack |
| out the codes on PBX's, use ESN readers made by the Curtis Company |
| to steal the ESN and MIN's out of the air and then to disseminate |
| this to the street phones and to the cellular phones that are in |
| cars and deprive the cellular industry of about $300 million a |
| year, and the rest of the telecommunications networks in the United |
| States probably of about $1 billion a year, due to the call sell |
| operations. |
| In one particular case that we watched, as a code was hacked |
| out on a PBX in a company in Massachusetts, the code was |
| disseminated to 250 street phones within the period of a week. By |
| the end of the month, a rather small bill of $40,000 was sent to |
| the company, small only because they were limited by the number of |
| telephone lines going through that company. Had it been a larger |
| company whose code had been cracked by the finger hacker, the bill |
| would have been in the hundreds of thousands of dollars, or over $1 |
| million as typically some of the bills have been. |
| But this is a relatively small group of people creating a |
| tremendous problem in the United States, and a law specifically |
| dealing with a person who is operating as an entrepreneur, running |
| a call selling operation, I think would go far to ending one of the |
| biggest problems we have. |
| Mr. FIELDS. Let me ask so I understand, Mr. Delaney and Mr. |
| Guidry, because I am a little confused, or maybe I just didn't |
| understand the testimony, are these individual hackers acting |
| separately, or are these people operating within a network, within |
| an organization? |
| Mr. DELANEY. These finger hackers are the people that control |
| the network of people that operate telephone booths and cellular |
| phones for reselling telephone service. These finger hackers are |
| not computer hackers. |
| Mr. FIELDS. When you say finger hackers, is this one person |
| operating independently, or is that finger hacker operating in |
| concert -- |
| Mr. GUIDRY. No. He has franchised. He has franchised out. He |
| actually sells the computer and the software and the cattail to do |
| this to other people, and then they start their own little group. |
| Now it is going internationally. |
| Mr. FIELDS. Explain to me, if the chairman would permit -- |
| Mr. MARKEY. Please. |
| Mr. FIELDS. Explain to me the franchise. |
| Mr. GUIDRY. What happens is, let's pretend we are in Los |
| Angeles right now and I have the ability to clone a phone that is |
| using a computer, a cattail, we call it, that goes from the |
| computer, the back of the computer, into the telephone, and I have |
| the diskette that tells me how to change that program. I can at |
| some point sell the cloning. You can come to me, and I can clone |
| your phone. |
| However, that is one way for me to make money. The best way |
| for me to make money is to buy computers, additional diskettes, and |
| go to Radio Shack or some place and make additional cattails and |
| say, "I can either clone your phone for $1,500, or what you can do |
| for $5,000 is start your own company." So you say, "Well, wow, |
| that's pretty good, because how many times would I have to sell one |
| phone at from $500 to $1,500 to get my initial investment back?" As |
| a result now, you have groups, you have just youngsters as well as |
| organized crime stepping in. |
| The Guidry Group has worked in the Philippines on this, we |
| have worked in Mexico, the Dominican Republic, Chile, Argentina, |
| and next week I will be in London and in Rome. It is so bad, sir, |
| that now intelligence agencies in Rome have told me -- and that is |
| what I am going there for -- that organized crime seems to think |
| that telecommunications fraud is more lucrative, unfortunately, |
| than drugs, and it is darned sure more lucrative in the Los |
| Angeles, probably New York, and Miami areas, because right now |
| prosecution is not that strong. It is unfortunate that all of law |
| enforcement is not trained, nor could they be, to pick up on |
| someone standing on a corner using an illegitimate phone. |
| Mr. FIELDS. How would a person know where to get their |
| telephone cloned? |
| Mr. GUIDRY. Let me tell you what happens. Normally when we go |
| into a major metropolitan city, or we also check the computer |
| bulletin boards, a lot of times that information is there. Most of |
| the time, though, it is in magazines, like green sheets, which are |
| free advertisements saying, "Call anywhere in the world. Come to --" |
| a location, or, "Call this number." Also in Los Angeles, for some |
| reason, they seem to advertise a lot in sex magazines, and people |
| will simply buy a sex magazine and there will be a statement in |
| there, "Earn money the fast way. Start your own telecommunications |
| company." And then we will follow up on that tip and work with the |
| Secret Service to try to apprehend those people. |
| Mr. FIELDS. Mr. Haugh. |
| Mr. HAUGH. If I could just add a few comments, it would be |
| most unfortunate if this denigrates into a discussion of |
| adolescents who are curious and so-called finger hackers. The truth |
| of the matter is that the toll fraudsters are adults, they are |
| organized, they are smart, they are savvy, and the drug dealers in |
| particular are learning very quickly that it is far more lucrative, |
| far less dangerous, to go into the telecom crime business. |
| "Finger hacking" is a term, but the truth is, war dialers, |
| speed dialers, modems, automated equipment now will hack and crack |
| into systems and break the codes overnight. While the criminal |
| sleeps, his equipment penetrates those systems. He gets up in the |
| morning, and he has got a print sheet of new numbers that his |
| equipment penetrated overnight. |
| We have interviewed the criminals involved. These so-called |
| idle curiosity adolescents are being paid up to $10,000 a month for |
| new codes. I don't call that curiosity, I call that venality. We |
| are talking a $4 billion problem. |
| The chairman came up with the Maple Street example. I think |
| even better yet, Mr. Chairman, the truth is that 216 Maple had a |
| security device on the door and a code, and what Mr. Goldstein and |
| his ilk do is sell that code through selling subscriptions to these |
| periodicals. There is a big difference, in my opinion, between |
| saying, "216 Maple is open" -- that is bad enough -- than to say, |
| "You go to 216 Maple, and push 4156, and you can get in the door." |
| But we are talking about crime, we are talking about adults, |
| we are talking about organized crime, perhaps not in the Cosa |
| Nostra sense, but even the Cosa Nostra is wising up that they can |
| finance some of these operations, and in New York and Los Angeles, |
| in particular, the true Mafia is now beginning to finance some of |
| these telecom fraud operations. |
| Mr. FIELDS. Mr. Guidry, one last question. Is it the Secret |
| Service that is at the forefront of Federal activity? |
| Mr. GUIDRY. Yes, sir, it is. |
| Mr. FIELDS. Do they have the resources to adequately deal with |
| this problem? |
| Mr. GUIDRY. No, sir. The problem is growing so rapidly that |
| they are undermanned in this area but have asked for additional |
| manpower. |
| Mr. FIELDS. Is this a priority for the Secret Service? |
| Mr. GUIDRY. Yes, sir, it is. |
| Mr. FIELDS. Thank you, Mr Chairman. |
| Mr. MARKEY. The gentleman's time has expired. |
| Again, it is a $4 to $5 billion problem. |
| Mr. HAUGH. That is what our research indicated. |
| Mr. MARKEY. There were 35,000 victims last year alone. |
| Mr. HAUGH. Yes, sir, and this is only users, large users. Now |
| it can be businesses, nonprofits. There is a university on the East |
| Coast that just this last week got hit for $490,000, and the fraud |
| is continuing. |
| Mr. MARKEY. The gentleman from Ohio. |
| Mr. OXLEY. Thank you, Mr. Chairman. |
| Let me ask the witnesses: Other than making the penalties |
| tougher for this type of activity, what other recommendations, if |
| any, would any of you have that we could deal with, that our |
| subcommittee should look at, and the Judiciary Committee, I assume, |
| for what we might want to try to accomplish? |
| Mr. Haugh? |
| Mr. HAUGH. I happen to disagree with a couple of the witnesses |
| who have indicated tougher penalties. I mean it sounds great. You |
| know, that is the common instant reaction to anything, expand the |
| penalties. I happen to think 20 years is plenty enough for criminal |
| penetration of a telecom system, and there are a few housekeeping |
| things that could be done. |
| The problem isn't the adequacy of the law, the laws are pretty |
| adequate, and, as Mr. Delaney indicated, you have a violation |
| someplace, you have got a State law and a Federal law, both, and if |
| you are a smart prosecutor, there are about eight different ways |
| you can go after these criminals. |
| The truth is, we have got inadequate enforcement, inadequate |
| funding, inadequate pressure on the part of the Congress on the FCC |
| to make more proactive efforts and to put more heat on the industry |
| to coordinate. |
| The truth is that the carriers compete with each other |
| fiercely. They, with some limited exceptions, don't share |
| appropriate information with each other. The LEC's and the RBOC's |
| hide behind privacy; they hide behind other excuses not to |
| cooperate with law enforcement and with the rest of the industry as |
| effectively as they should. |
| So I think putting the heat on the industry, putting the heat |
| on the FCC, more adequately funding the FCC, more adequately |
| funding the Secret Service, and having hearings like this that |
| focus on the problem is the answer and not expanding the penalty |
| from 20 years to 25 years. Nobody gets 20 years anyway, so |
| expanding the 20 years is, to me, not the answer. |
| Mr. OXLEY. What is the average sentence for something like |
| that? |
| Mr. HAUGH. I think the average toll fraud criminal who |
| actually goes to jail -- and they are few and far between -- spends |
| 3 to 6 months, and they are out. |
| Now recidivism levels are low, I agree with Mr. Delaney. Once |
| you catch them, they rarely go back to it. So it isn't a question |
| of putting them in jail forever, it is a question of putting them |
| in jail. The certainty of punishment level is very low. |
| We talked to a drug dealer in New York City who left the drug |
| business to go into toll fraud because he told me he can make |
| $900,000 a year -- nontaxable income, he called it -- and never |
| ever worry about going to jail. |
| Mr. DELANEY. In New York City, I have never seen anybody go to |
| jail on a first offense for anything short of armed robbery, let |
| alone telephone fraud. They typically get 200 hours of community |
| service, depending upon the judge. |
| These people that I am speaking about are not the computer |
| hackers that we were speaking about earlier, these are the people |
| that are the finger hackers that break into the PBX's around the |
| country. These are immigrants in the United States, they are |
| adults, they know how to operate a telephone. They sit there |
| generally -- almost every one that we have arrested so far uses a |
| Panasonic memory telephone, and they sit there night and day try |
| ing to hack out the PBX codes. They go through all the default |
| codes of the major manufacturers of PBX's. They know that much. |
| We don't have a single person in New York City, that I know |
| of, that is hacking PBX's with a computer. The long distance |
| carriers can see patterns of hacking into 800 lines, which are |
| typically the PBX's, and they can see that it is being done by |
| telephone, by finger hacking a telephone key pad, as opposed to a |
| computer. |
| The war dialing programs that Mr. Haugh referred to are |
| typically used by the computer hackers to get these codes, but they |
| create only a minuscule amount of the fraud that is ongoing in the |
| country. The great majority is generated by the finger hackers who |
| then disseminate those codes to the telephone booths and the call |
| selling operations that operate out of apartments in New York City. |
| In one apartment with five telephones in it that operates 16 hours |
| a day for 365 days a year selling telephone service at $10 for 20 |
| minutes, you take in $985,000. It is a very profitable business. |
| One of the individuals we arrested that said he did this |
| because it was more profitable and less likely that he be caught |
| than in selling drugs was murdered several months after we arrested |
| him in the Colombian section of Queens because he was operating as |
| an independent. It is a very controlled situation in New York City, |
| and different ethnicities throughout New York City control the call |
| sell operations in their neighborhoods, and everyone in those |
| neighborhoods knows where they can go to make an illicit phone call |
| or to get a phone cloned, whether it is a reprogrammed phone or |
| rechipped. |
| Mr. OXLEY. Mr. Guidry, did you have a comment? |
| Mr. GUIDRY. Well, I think that we really do need to enforce |
| the laws and we need to make some statutory changes in title 18, |
| section 1029 to include cellular and wireless. |
| I have been in courtrooms where really savvy defense attorneys |
| say, "Well, it does not specifically indicate cellular or |
| wireless," and that raises some question in the jury's mind, and I |
| would just as soon that question not be there. |
| Mr. OXLEY. Thank you. |
| Mr. Chairman, I see we have got a vote, and I yield back the |
| balance of my time. |
| Mr. MARKEY. Thank you. |
| We are going to have each one of you make a very brief summary |
| statement to the committee if you could, and then we are going to |
| adjourn the hearing. |
| As you know, the Federal Communications Commission will be |
| testifying before this subcommittee next week. We have a great |
| concern that, although they held an all-day hearing on toll fraud |
| last October, while we thought they were going to move ahead in an |
| expeditious fashion, that, with a lot of good information, it has |
| all sat on the shelf since that time. We expected them to act on |
| that information to establish new rules protecting consumers and |
| pushing carriers to do a lot more than they have done thus far to |
| protect their networks. In light of recent court decisions holding |
| that consumers are always liable I think that action by the FCC is |
| long overdue, and at the FCC authorization hearing next week I |
| expect to explore this issue with the commissioners in depth, so |
| you can be sure of that, Mr. Haugh. |
| Let's give each of you a 1-minute summation. Again, we will go |
| in reverse order and begin with you, Mr. Guidry. |
| Mr. GUIDRY. Thank you, sir. |
| Telecommunications fraud, of course, is going internationally, |
| and as it goes internationally and starts to franchise and get more |
| organized, we are going to have to figure out a better way to |
| combat it. Industry itself right now is putting its best foot |
| forward. However, I would ask this committee to strongly look at |
| changing some of this legislation and to also increase law |
| enforcement's efforts through manpower. |
| Thank you very much, sir. |
| Mr. MARKEY. Thank you. |
| Mr. Haugh. |
| Mr. HAUGH. I agree with Mr. Guidry that there are some |
| housekeeping changes that need to be made, and the particular title |
| and section he referred to should definitely be amended to include |
| more clearly wireless. |
| The overall problem is an immense one; it is a very serious |
| one; it is a complicated one. Everybody is at fault. Finger |
| pointing has been carried to an extreme. Again, I think the long |
| distance carriers, the big three -- AT&T, MCI, and Sprint -- have |
| done a superb job of coming up to speed with monitoring. They are |
| starting to cooperate better. They have really come to the table. |
| The laggards are the LEC's and the RBOC's, the CPE |
| manufacturers, and the FCC. In fairness to the FCC, they are |
| understaffed, undermanned, underfunded. They can't even take care |
| of all their mandated responsibilities right now, let alone take on |
| new chores. |
| All that said, there is a great deal the FCC can do -- |
| jawboning, regulations, pushing the LEC's and the RBOC's, in |
| particular, to get real, get serious -- and I would urge this |
| committee -- applaud your efforts and urge you to continue that. |
| Mr. MARKEY. Thank you. |
| Dr. Tippett. |
| Mr. TIPPETT. Thank you. |
| The computer virus issue is a little bit different than the |
| toll fraud issue. In fact, there are no significant laws that deal |
| with viruses, and, in fact, the fact that there are no laws gives |
| the people who write viruses license to write them. The typical |
| statement you read is, "It's not illegal, and I don't do anything |
| that is illegal." So in the computer virus arena we do need laws. |
| They don't need to be fancy; they don't need to be extensive. There |
| are some suggestions of approaches to virus legislation in my |
| written testimony. |
| We also need education, and I would encourage Congress to |
| underwrite some education efforts that the private sector could |
| perform in various ways, perhaps through tax incentives or tax |
| credits. The problem is growing and large. It exceeds $1 billion |
| already in the United States, and it is going to be a $2 billion |
| problem in 1994. |
| As bad as toll fraud seems, this virus issue is, oddly, more |
| pervasive and less interesting to a whole lot of people, and I |
| think it needs some higher attention. |
| Mr. MARKEY. Thank you. |
| Mr. Goldstein. |
| Mr. GOLDSTEIN. Thank you. |
| I would like to close by cautioning the subcommittee and all |
| of us not to mix up these two very distinct worlds we are talking |
| about, the world of the criminal and the world of the experimenter, |
| the person that is seeking to learn. To do so will be to create a |
| society where people are afraid to experiment and try variations on |
| a theme because they might be committing some kind of a crime, and |
| at the same time further legislation could have the effect of not |
| really doing much for drug dealers and gangsters, who are doing far |
| more serious crimes than making free phone calls, and it is not |
| likely to intimidate them very much. |
| I think the answer is for all of us to understand specifically |
| what the weaknesses in the technology are and to figure out ways to |
| keep it as strong and fortress-like as possible. I do think it is |
| possible with as much research as we can put into it. |
| Thank you. |
| Mr. MARKEY. Thank you, Mr. Goldstein. |
| Mr. Delaney. |
| Mr. DELANEY. Last year, the Secret Service and the FBI |
| arrested people in New York City for conducting illegal wiretaps. |
| The ability to still do that by a hacker exists in the United |
| States. Concerned with privacy, I am very happy to see that |
| something like the Clipper chip is going to become available to |
| protect society. I do hope, though, that we will always have for |
| the necessary law enforcement investigation the ability to conduct |
| those wiretaps. Without it, I see chaos. |
| But with respect to the cellular losses, the industry is |
| coming along a very rapid rate with technology to save them money |
| in the future, because with encryption nobody will be able to steal |
| their signals either. |
| Mr. MARKEY. Thank you, Mr. Delaney. |
| I apologize. There is a roll call on the Floor, and I only |
| have 3 minutes to get over there to make it. You have all been very |
| helpful to us here today. It is a very tough balancing act, but we |
| are going to be moving aggressively in this area. And we are going |
| to need all of you to stay close to us so that we pass legislation |
| that makes sense. |
| This hearing is adjourned. Thank you. |
| [Whereupon, at 12:16 p.m., the subcommittee was adjourned.] |
|
|
|
|