| ==Phrack Magazine== |
|
|
| Volume Five, Issue Forty-Six, File 28 of 28 |
|
|
| PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Compiled by Datastream Cowboy PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
| Damn The Torpedoes June 6, 1994 |
| ~~~~~~~~~~~~~~~~~~ |
| by Loring Wirbel (Electronic Engineering Times) (Page 134) |
|
|
| On May 3, a gargantuan satellite was launched with little press coverage |
| from Cape Canaveral. |
|
|
| The $1.5 billion satellite is a joint project of the NSA and the |
| National Reconnaissance Office. At five tons, it is heavy enough to |
| have required every bit of thrust its Titan IV launcher could |
| provide--and despite the boost, it still did enough damage to the |
| launch-pad water main to render the facility unusable for two months. |
|
|
| The satellite is known as Mentor, Jeroboam and Big Bertha, and it has an |
| antenna larger than a football field to carry out "hyper-spectral |
| analysis" -- Reconnaissance Office buzzwords for real-time analysis of |
| communications in a very wide swath of the electromagnetic spectrum. |
|
|
| Clipper and Digital Signature Standard opponents should be paying |
| attention to this one. Mentor surprised space analysts by moving into a |
| geostationary rather than geosynchronous orbit. Geostationary orbit |
| allows the satellite to "park" over a certain sector of the earth. |
|
|
| This first satellite in a planned series was heading for the Ural |
| Mountains in Russia at last notice. Additional launches planned for |
| late 1994 will park future Mentors over the western hemisphere. |
|
|
| According to John Pike of the Federation of American Scientists, those |
| satellites will likely be controlled from Buckley Field (Aurora, |
| Colorado), an NSA/Reconnaissance downlink base slated to become this |
| hemisphere's largest intelligence base in the 1990s. |
|
|
| [Able to hear a bug fart from space. DC to Daylight realtime analysis. |
| And you Clipper whiners cry about someone listening to your phone calls. |
| Puh-lease.] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Discovery of 'Data Processing Virus Factory' In Italy February 17, 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| AFP Sciences |
|
|
| It was learned in Rome on 10 February that a data processing virus |
| "factory" -- in fact, a program called VCL (Viruses Creation Laboratory), |
| capable of triggering a virus epidemic--was discovered in Italy |
|
|
| Mr. Fulvio Berghella, deputy directory-general of the Italian Institute |
| for Bank Data Processing Security (ISTINFORM), discovered what it takes |
| to enable just about anybody to fabricate data processing viruses; he told |
| the press that its existence had been suspected for a year and a half and |
| that about a hundred Italian enterprises had been "contaminated." |
|
|
| An investigation was launched to try to determine the origin of the program, |
| said Mr. Alessandro Pansa, chief of the "data processing crime" section |
| of the Italian police. Several copies of VCL were found in various places, |
| particularly in Rome and Milan. |
|
|
| Producing viruses is very simple with the help of this program, but it is |
| not easy to find. A clandestine Bulgarian data bank, as yet not identified, |
| reportedly was behind all this. An international meeting of data processing |
| virus "hunters" was organized in Amsterdam on 12 February to draft |
| a strategy; an international police meeting on this subject will be held |
| next week in Sweden. |
|
|
| Since 1991, the number of viruses in circulation throughout the world |
| increased 500% to a total of about 10,000 viruses. In Italy, it is not |
| forbidden to own a program of this type, but dissemination of viruses |
| is prosecuted. |
|
|
| [So, I take it Nowhere Man cannot ever travel to Italy?] |
|
|
| -------------------------------------------------------------------------- |
|
|
| DEFCON TV-News Coverage July 26, 1994 |
| by Hal Eisner (Real News at 10) (KCOP Channel 13 Los Angeles) |
|
|
| [Shot of audience] |
|
|
| Female Newscaster: "Hackers are like frontier outlaws. Look at what Hal |
| Eisner found at a gathering of hackers on the Las |
| Vegas strip." |
|
|
| [Shot of "Welcome to Vegas" sign] |
| [Shot of Code Thief Deluxe v3.5] |
| [Shot of Dark Tangent talking] |
|
|
| Dark Tangent: "Welcome to the convention!" |
|
|
| [Shot of Voyager hanging with some people] |
|
|
| Hal Eisner: "Well not everyone was welcome to this year's |
| Def Con II, a national convention for hackers. |
| Certainly federal agents weren't." |
|
|
| [Shot DTangent searching for a fed] |
|
|
| Dark Tangent: "On the right. Getting closer." |
|
|
| Fed: "Must be me! Thank you." |
|
|
| [Dark Tangent gives the Fed "I'm a Fed" t-shirt] |
|
|
| Hail Eisner: "Suspected agents were ridiculed and given |
| identifying t-shirts. While conventioneers, some of |
| [Shot of someone using a laptop] |
| which have violated the law, and many of which are |
| [Shot of some guy reading the DefCon pamphlet] |
| simply tech-heads hungry for the latest theory, got |
| [Shot of a frequency counter, and a scanner] |
| to see a lot of the newest gadgetry, and hear some |
| tough talk from an Arizona Deputy DA that |
| [Shot of Gail giving her speech] |
| specializes on computer crime and actually |
| recognized some of her audience." |
|
|
| Gail: "Some people are outlaws, crooks, felons maybe." |
|
|
| [Shot back of conference room. People hanging] |
|
|
| Hal Eisner: "There was an Alice in Wonderland quality about all |
| of this. Hackers by definition go where they are not |
| invited, but so is the government that is trying to |
| intrude on their privacy." |
|
|
| Devlin: "If I want to conceal something for whatever reason. |
| I'd like to have the ability to." |
|
|
| Hal Eisner: "The bottom line is that many of the people here |
| want to do what they want, when they want, and how |
| they want, without restrictions." |
|
|
| Deadkat: "What we are doing is changing the system, and if you |
| have to break the law to change the system, so be it!" |
|
|
| Hal Eisner: "That's from residents of that cyberspacious world |
| [Shot of someone holding a diskette with what is supposed to be codez on the |
| label] |
| of behind the computer screen where the shy can be |
| [Code Thief on the background] |
| dangerous. Reporting from Las Vegas, Hal Eisner, |
| Real News. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Cyber Cops May 23, 1994 |
| ~~~~~~~~~~ |
| by Joseph Panettieri (Information Week) (Page 30) |
|
|
| When Chris Myers, a software engineer at Washington University in |
| St. Louis, arrived to work one Monday morning last month, he realized |
| something wasn't quite right. Files had been damaged and a back door |
| was left ajar. Not in his office, but on the university's computer network. |
|
|
| Like Commissioner Gordon racing to the Batphone, Myers swiftly called the |
| Internet's guardian, the Computer Emergency Response Team (CERT). |
|
|
| The CERT team boasts impressive credentials. Its 14 team members are |
| managed by Dain Gary, former director of corporate data security at |
| Mellon Bank Corp. in Pittsburgh. While Gary is the coach of the CERT |
| squad, Moira West is the scrambling on-field quarterback. As manager |
| of CERT's incident-response team and coordination center, she oversees |
| the team's responses to attacks by Internet hackers and its search for |
| ways to reduce the Internet's vulnerabilities. West was formerly a |
| software engineer at the University of York in England. |
|
|
| The rest of the CERT team remains in the shadows. West says |
| the CERT crew hails from various information-systems backgrounds, |
| but declines to get more specific, possibly to hide any Achilles' |
| heels from hackers. |
|
|
| One thing West stresses is that CERT isn't a collection of reformed |
| hackers combing the Internet for suspicious data. "People have to |
| trust us, so hiring hackers definitely isn't an option," she says. |
| "And we don't probe or log-on to other people's systems." |
|
|
| As a rule, CERT won't post an alert until after it finds a |
| remedy to the problem. But that can take months, giving hackers |
| time to attempt similar breakins on thousands of Internet hosts |
| without fear of detection. Yet CERT's West defends this policy: |
| "We don't want to cause mass hysteria if there's no way to |
| address a new, isolated problem. We also don't want to alert the |
| entire intruder community about it." |
|
|
| ------------------------------------ |
| Who You Gonna Call? |
| How to reach CERT |
|
|
| Phone: 412-268-7090 |
| Internet: cert@cert.org |
| Fax: 412-268-6989 |
| Mail: CERT Coordination Center |
| Software Engineering Institute |
| Carnegie Mellon University |
| Pittsburgh, PA 15213-3890 |
| ------------------------------------ |
|
|
| [Ask for that saucy British chippie. Her voice will melt you like |
| butter. |
|
|
| CERT -- Continually re-emphasizing the adage: "You get what you pay for!"] |
|
|
| And remember, CERT doesn't hire hackers, they just suck the juicy bits |
| out of their brains for free. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Defining the Ethics of Hacking August 12, 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Amy Harmon (Los Angeles Times) (page A1) |
|
|
| Eric Corley, a.k.a Emmanuel Goldstein -- patron saint of computer |
| hackers and phone phreaks -- is having a party. |
|
|
| And perhaps it is just in time. 2600, the hacker magazine Corley |
| started when he was 23, is a decade old. It has spawned monthly |
| hacker meetings in dozens of cities. It has been the target of a |
| Secret Service investigation. It has even gone aboveground, with |
| newsstand sales of 20,000 last year. |
|
|
| As hundreds of hackers converge in New York City this weekend to celebrate |
| 2600's anniversary, Corley hopes to grapple with how to uphold the |
| "hacker ethic," an oxymoron to some, in an era when many of 2600's devotees |
| just want to know how to make free phone calls. (Less high-minded |
| activities -- like cracking the New York City subway's new electronic |
| fare card system -- are also on the agenda). |
|
|
| Hackers counter that in a society increasingly dependent on |
| technology, the very basis for democracy could be threatened by limiting |
| technological exploration. "Hacking teaches people to think critically about |
| technology," says Rop Gonggrijp, a Dutch hacker who will attend the Hackers |
| on Planet Earth conference this weekend. "The corporations that are building |
| the technology are certainly not going to tell us, because they're trying to |
| sell it to us. Whole societies are trusting technology blindly -- they just |
| believe what the technocrats say." |
|
|
| Gonggrijp, 26, publishes a magazine much like 2600 called Hack-Tic, |
| which made waves this year with an article showing that while tapping mobile |
| phones of criminal suspects with radio scanners, Dutch police tapped into |
| thousand of other mobile phones. |
|
|
| "What society needs is people who are independent yet knowledgeable," |
| Gonggrijp said. 'That's mostly going to be young people, which society is |
| uncomfortable with. But there's only two groups who know how the phone and |
| computer systems work, and that's engineers and hackers. And I think that's |
| a very healthy situation." |
|
|
| [By the way Amy: Phrack always grants interviews to cute, female |
| LA Times reporters.] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Fighting Telephone Fraud August 1, 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Barbara DePompa (Information Week) (Page 74) |
|
|
| Local phone companies are taking an active role in warning customers of |
| scams and cracking down on hackers. |
|
|
| Early last month, a 17-year old hacker in Baltimore was caught |
| red-handed with a list of more than 100 corporate authorization codes that |
| would have enabled fraud artists to access private branch exchanges and |
| make outgoing calls at corporate expanse. |
|
|
| After the teenager's arrest, local police shared the list with Bell |
| Atlantic's fraud prevention group. Within hours, the phone numbers were |
| communicated to the appropriate regional phone companies and corporate |
| customers on the list were advised to either change their authorization |
| codes or shut down outside dialing privileges. |
|
|
| "We can't curb fraud without full disclosure and sharing this type |
| of vital information" points out Mary Chacanias, manager of |
| telecommunications fraud prevention for Bell Atlantic in Arlington, VA. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| AT&T Forms Team to Track Hackers August 30, 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (Reuters News Wire) |
|
|
| AT&T Corp.'s Global Business Communications Systems subsidiary said |
| Wednesday it has formed an investigative unit to monitor, track and |
| catch phone-system hackers in the act of committing toll fraud. |
|
|
| The unit will profile hacker activity and initiate "electronic |
| stakeouts" with its business communications equipment in cooperation |
| with law enforcement agencies, and work with them to prosecute the |
| thieves. |
|
|
| "We're in a shoot-out between 'high-tech cops' -- like AT&T -- and |
| 'high-tech robbers' who brazenly steal long distance service from our |
| business customers," said Kevin Hanley, marketing director for business |
| security systems for AT&T Global Business. |
|
|
| "Our goal is not only to defend against hackers but to get them off the |
| street." |
|
|
| [Oh my God. Are you scared? Have you wet yourself? YOU WILL!] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Former FBI Informant a Fugitive July 31, 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Keith Stone (Daily News) |
|
|
| Computer outlaw Justin Tanner Petersen and prosecutors |
| cut a deal: The Los Angeles nightclub promoter known in |
| the computer world as "Agent Steal" would work for the |
| government in exchange for freedom. |
|
|
| With his help, the government built its case against |
| Kevin Lee Poulsen, a Pasadena native who pleaded guilty |
| in June to charges he electronically rigged telephones at |
| Los Angeles radio stations so he could win two Porsches, |
| $22,000 and two trips to Hawaii. |
|
|
| Petersen also provided information on Kevin Mitnick, a |
| Calabasas man wanted by the FBI for cracking computer and |
| telephone networks at Pacific Bell and the state Department |
| of Motor Vehicles, according to court records. |
|
|
| Petersen's deal lasted for nearly two years - until |
| authorities found that while he was helping them undercover, |
| he also was helping himself to other people's credit cards. |
|
|
| Caught but not cornered, the 34-year-old "Agent Steal" had |
| one more trick: He admitted his wrongdoing to a prosecutor |
| at the Los Angeles U.S. Attorney's Office, asked to meet |
| with his attorney and then said he needed to take a walk. |
|
|
| And he never came back. |
|
|
| A month after Petersen fled, he spoke with a magazine for |
| computer users about his role as an FBI informant, who he |
| had worked against and his plans for the future. |
|
|
| "I have learned a lot about how the bureau works. Probably |
| too much," he said in an interview that Phrack Magazine published |
| Nov. 17, 1993. Phrack is available on the Internet, a worldwide |
| network for computer users. |
|
|
| Petersen told the magazine that working with the FBI was fun |
| most of the time. "There was a lot of money and resources used. |
| In addition, they paid me well," he said. |
|
|
| "If I didn't cooperate with the bureau," he told Phrack, "I |
| could have been charged with possession of government material." |
|
|
| "Most hackers would have sold out their mother," he added. |
|
|
| Petersen is described as 5 foot, 11 inches, 175 pounds, with |
| brown hair - "sometimes platinum blond." But his most telling |
| characteristic is that he walks with the aid of a prosthesis |
| because he lost his left leg below the knee in a car accident. |
|
|
| Heavily involved in the Hollywood music scene, Petersen's |
| last known employer was Club "Velvet Jam," one of a string of |
| clubs he promoted in Los Angeles. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hacker in Hiding July 31, 1994 |
| ~~~~~~~~~~~~~~~~ |
| by John Johnson (LA Times) |
|
|
| First there was the Condor, then Dark Dante. The latest computer hacker to |
| hit the cyberspace most wanted list is Agent Steal, a slender, good-looking |
| rogue partial to Porsches and BMWs who bragged that he worked undercover |
| for the FBI catching other hackers. |
|
|
| Now Agent Steal, whose real name is Justin Tanner Petersen, is on the run |
| from the very agency he told friends was paying his rent and flying him to |
| computer conferences to spy on other hackers. |
|
|
| Petersen, 34, disappeared Oct. 18 after admitting to federal prosecutors |
| that he had been committing further crimes during the time when he was |
| apparently working with the government "in the investigation of other |
| persons," according to federal court records. |
|
|
| Ironically, by running he has consigned himself to the same secretive life |
| as Kevin Mitnick, the former North Hills man who is one of the nation's most |
| infamous hackers, and whom Petersen allegedly bragged of helping to set up |
| for an FBI bust. Mitnick, who once took the name Condor in homage to a |
| favorite movie character, has been hiding for almost two years to avoid |
| prosecution for allegedly hacking into computers illegally and posing as a |
| law enforcement officer. |
|
|
| Authorities say Petersen's list of hacks includes breaking into computers |
| used by federal investigative agencies and tapping into a credit card |
| information bureau. Petersen, who once promoted after-hours rock shows in |
| the San Fernando Valley, also was involved in the hacker underground's most |
| sensational scam - hijacking radio station phone lines to win contests with |
| prizes ranging from new cars to trips to Hawaii. |
|
|
| Petersen gave an interview last year to an on-line publication called Phrack |
| in which he claimed to have tapped the phone of a prostitute working for |
| Heidi Fleiss. He also boasted openly of working with the FBI to bust |
| Mitnick. |
|
|
| "When I went to work for the bureau I contacted him," Petersen said in the |
| interview conducted by Mike Bowen. "He was still up to his old tricks, so |
| we opened a case on him. . . . What a loser. Everyone thinks he is some |
| great hacker. I outsmarted him and busted him." |
|
|
| In the Phrack interview, published on the Internet, an international network |
| of computer networks with millions of users, Agent Steal bragged about |
| breaking into Pacific Bell headquarters with Poulsen to obtain information |
| about the phone company's investigation of his hacking. |
|
|
| Petersen was arrested in Texas in 1991, where he lived briefly. Court |
| records show that authorities searching his apartment found computer |
| equipment, Pacific Bell manuals and five modems. |
|
|
| A grand jury in Texas returned an eight-count indictment against Petersen, |
| accusing him of assuming false names, accessing a computer without |
| authorization, possessing stolen mail and fraudulently obtaining and using |
| credit cards. |
|
|
| The case was later transferred to California and sealed, out of concern for |
| Petersen's safety, authorities said. The motion to seal, obtained by |
| Sherman, states that Petersen, "acting in an undercover capacity, currently |
| is cooperating with the United States in the investigation of other persons |
| in California." |
|
|
| In the Phrack interview, Petersen makes no apologies for his choices in life. |
|
|
| While discussing Petersen's role as an informant, Mike Bowen says, "I think |
| that most hackers would have done the same as you." |
|
|
| "Most hackers would have sold out their mother," Petersen responded. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Computer Criminal Caught After 10 Months on the Run August 30, 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Keith Stone (Daily News) |
|
|
| Convicted computer criminal Justin Tanner Petersen was captured Monday in |
| Los Angeles, 10 months after federal authorities said they discovered he |
| had begun living a dual life as their informant and an outlaw hacker. |
|
|
| Petersen, 34, was arrested about 3:30 a.m. outside a Westwood apartment |
| that FBI agents had placed under surveillance, said Assistant U.S. |
| Attorney David Schindler. |
|
|
| A flamboyant hacker known in the computer world as "Agent Steal," Petersen |
| was being held without bail in the federal detention center in Los Angeles. |
| U.S. District Court Judge Stephen V. Wilson scheduled a sentencing hearing |
| for Oct. 31. |
|
|
| Petersen faces a maximum of 40 years in prison for using his sophisticated |
| computer skills to rig a radio contest in Los Angeles, tap telephone lines |
| and enrich himself with credit cards. |
|
|
| Monday's arrest ends Petersen's run from the same FBI agents with whom he |
| had once struck a deal: to remain free on bond in exchange for pleading |
| guilty to several computer crimes and helping the FBI with other hacker |
| cases. |
|
|
| The one-time nightclub promoter pleaded guilty in April 1993 to six federal |
| charges. And he agreed to help the government build its case against Kevin |
| Lee Poulsen, who was convicted of manipulating telephones to win radio |
| contests and is awaiting trial on espionage charges in San Francisco. |
|
|
| Authorities said they later learned that Petersen had violated the deal by |
| committing new crimes even as he was awaiting sentencing in the plea |
| agreement. |
|
|
| On Monday, FBI agents acting on a tip were waiting for Petersen when he parked |
| a BMW at the Westwood apartment building. An FBI agent called Petersen's |
| name, and Petersen began to run, Schindler said. |
|
|
| Two FBI agents gave chase and quickly caught Petersen, who has a prosthetic |
| lower left leg because of a car-motorcycle accident several years ago. |
|
|
| In April 1993, Petersen pleaded guilty to six federal charges including |
| conspiracy, computer fraud, intercepting wire communications, transporting |
| a stolen vehicle across state lines and wrongfully accessing TRW credit |
| files. Among the crimes that Petersen has admitted to was working with other |
| people to seize control of telephone lines so they could win radio |
| promotional contests. In 1989, Petersen used that trick and walked away with |
| $10,000 in prize money from an FM station, court records show. |
|
|
| When that and other misdeeds began to catch up with him, Petersen said, he |
| fled to Dallas, where he assumed the alias Samuel Grossman and continued |
| using computers to make money illegally. |
|
|
| When he as finally arrested in 1991, Petersen played his last card. |
| "I called up the FBI and said: 'Guess what? I am in jail,' " he said. |
| He said he spent the next four months in prison, negotiating for his freedom |
| with the promise that he would act as an informant in Los Angeles. |
|
|
| The FBI paid his rent and utilities and gave him $200 a week for spending |
| money and medical insurance, Petersen said. |
|
|
| They also provided him with a computer and phone lines to gather information |
| on hackers, he said. |
|
|
| Eventually, Petersen said, the FBI stopped supporting him so he turned to |
| his nightclubs for income. But when that began to fail, he returned to |
| hacking for profit. |
|
|
| "I was stuck out on a limb. I was almost out on the street. My club |
| was costing me money because it was a new club," he said. "So I did what |
| I had to do. I an not a greedy person." |
|
|
| [Broke, Busted, Distrusted. Turning in your friends leads to some |
| seriously bad Karma, man. Negative energy like that returns ten-fold. |
| You never know in what form either. You could end getting shot, |
| thrown in jail, or worse, test HIV Positive. So many titty-dancers, |
| so little time, eh dude? Good luck and God bless ya' Justin.] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Fugitive Hacker Baffles FBI With Technical Guile July 5, 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by John Markoff (New York Times) |
|
|
| [Mitnik, Mitnik, Mitnik, and more Mitnik. Poor bastard. No rest for |
| the wicked, eh Kevin?] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Computer Outlaws Invade the Internet May 24, 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Mike Toner (Atlanta Journal-Constitution) |
|
|
| A nationwide wave of computer break-ins has law enforcement |
| authorities scrambling to track down a sophisticated ring of |
| "hackers" who have used the international "information |
| highway," the Internet, to steal more than 100,000 passwords -- the |
| electronic keys to vast quantities of information stored on |
| government, university and corporate computer systems. |
|
|
| Since the discovery of an isolated break-in last year at a |
| single computer that provides a "gateway" to the Internet, |
| operators of at least 30 major computer systems have found illicit |
| password "sniffers" on their machines. |
|
|
| The Federal Bureau of Investigation has been investigating the |
| so-called "sniffer" attacks since February, but security experts |
| say the intrusions are continuing -- spurred, in part, by the |
| publication last month of line-by-line instructions for the |
| offending software in an on-line magazine for hackers. |
|
|
| Computer security experts say the recent rash of password piracy |
| using the Internet is much more serious than earlier security |
| violations, like the electronic "worm" unleashed in 1988 by |
| Cornell University graduate student Robert Morris. |
|
|
| "This is a major concern for the whole country," she says. |
| "I've had some sleepless nights just thinking about what could |
| happen. It's scary. Once someone has your ID and your password, |
| they can read everything you own, erase it or shut a system down. |
| They can steal proprietary information and sell it, and you might |
| not even know it's gone." |
|
|
| "Society has shifted in the last few years from just using |
| computers in business to being absolutely dependent on them and the |
| information they give us -- and the bad guys are beginning to |
| appreciate the value of information," says Dain Gary, manager of |
| the Computer Emergency Response Team (CERT), a crack team of |
| software experts at Carnegie-Mellon University in Pittsburgh that |
| is supported by the Defense Department's Advanced Research Projects |
| Agency. |
|
|
| Gary says the current rash of Internet crime appears to be the |
| work of a "loosely knit but fairly organized group" of computer |
| hackers adept not only at breaking and entering, but at hiding |
| their presence once they're in. |
|
|
| Most of the recent break-ins follow a similar pattern. The |
| intruders gain access to a computer system by locating a weakness |
| in its security system -- what software experts call an "unpatched |
| vulnerability." |
|
|
| Once inside, the intruders install a network monitoring program, |
| a "sniffer," that captures and stores the first 128 keystrokes |
| of all newly opened accounts, which almost always includes a user's |
| log-on and password. |
|
|
| "We really got concerned when we discovered that the code had |
| been published in Phrack, an on-line magazine for hackers, on April |
| 1," he says. "Putting something like that in Phrack is a little |
| like publishing the instructions for converting semiautomatic |
| weapons into automatics. |
|
|
| Even more disturbing to security experts is the absence of a |
| foolproof defense. CERT has been working with computer system |
| administrators around the country to shore up electronic security, |
| but the team concedes that such "patches" are far from perfect. |
|
|
| [Look for plans on converting semiautomatic weapons into automatics |
| in the next issue.] |
| ------------------------------------------------------------------------------ |
|
|
| Information Superhighwaymen - Hacker Menace Persists May 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (Open Computing) (Page 25) |
|
|
| Once again the Internet has been labeled a security problem. And a new |
| breed of hackers has attracted attention for breaking into systems. |
| "This is a group of people copying what has been done for years," says |
| Chris Goggans, aka Erik Bloodaxe. "There's one difference: They don't |
| play nice." |
|
|
| Goggans was a member of the hacker gang called the Legion of Doom in the |
| late '80s to early '90s. Goggans says the new hacking group, which goes |
| by the name of "The Posse," has broken into numerous Business Week 1000 |
| companies including Sun Microsystems Inc., Boeing, and Xerox. He says |
| they've logged onto hundreds of universities and online services like |
| The Well. And they're getting root access on all these systems. |
|
|
| For their part, The Posse--a loose band of hackers--isn't talking. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Security Experts: Computer Hackers a Growing Concern July 22, 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| New York Times News Wire (Virginian-Pilot and Ledger Star) (2A) |
|
|
| Armed with increasing sophisticated snooping tools, computer programmers |
| operating both in the United States and abroad have gained unauthorized |
| access to hundreds of sensitive but unclassified government and military |
| computer networks called Internet, computer security experts said. |
|
|
| Classified government and military data, such as those that control |
| nuclear weapons, intelligence and other critical functions, are not |
| connected to the Internet and are believed to be safe from the types of |
| attacks reported recently. |
|
|
| The apparent ease with which hackers are entering military and government |
| systems suggests that similar if not greater intrusions are under way on |
| corporate, academic and commercial networks connected to the Internet. |
|
|
| Several sources said it was likely that only a small percentage of |
| intrusions, perhaps fewer than 5 percent, have been detected. |
|
|
| ------------------------------------------------------------------------------ |
|
|
| NSA Semi-confidential Rules Circulate |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Keay Davidson (San Francisco Examiner) (Page A1) |
|
|
| It arrived mysteriously at an Austin, Texas, post office box by "snail |
| mail" - computerese for the Postal Service. But once the National Security |
| Agency's employee handbook was translated into bits and bytes, it took |
| only minutes to circulate across the country. |
|
|
| Thus did a computer hacker in Texas display his disdain for government |
| secrecy last week - by feeding into public computer networks the |
| semiconfidential document, which describes an agency that, during the darkest |
| days of the Cold War, didn't officially "exist." |
|
|
| Now, anyone with a computer, telephone, modem and basic computer skills |
| can read the 36-page manual, which is stamped "FOR OFFICIAL USE ONLY" and |
| offers a glimpse of the shadowy world of U.S. intelligence - and the personal |
| price its inhabitants pay. |
|
|
| "Your home, car pool, and public places are not authorized areas to |
| conduct classified discussions - even if everyone involved in the discussion |
| possesses a proper clearance and "need-to-know.' The possibility that a |
| conversation could be overheard by unauthorized persons dictates the need to |
| guard against classified discussions in non-secure areas." |
|
|
| The manual is "so anal retentive and paranoid. This gives you some |
| insight into how they think," said Chris Goggans, the Austin hacker who |
| unleashed it on the computer world. His on-line nom de plume is "Erik |
| Bloodaxe" because "when I was about 11, I read a book on Vikings, and that |
| name really struck me." |
|
|
| NSA spokeswoman Judi Emmel said Tuesday that "apparently this document is |
| an (NSA) employee handbook, and it is not classified." Rather, it is an |
| official NSA employee manual and falls into a twilight zone of secrecy. On |
| one hand, it's "unclassified." On the other hand, it's "FOR OFFICIAL USE |
| ONLY" and can be obtained only by filing a formal request under the U.S. |
| Freedom of Information Act, Emmel said. |
|
|
| "While you may take this handbook home for further study, remember that |
| it does contain "FOR OFFICIAL USE ONLY' information which should be |
| protected," the manual warns. Unauthorized release of such information could |
| result in "appropriate administrative action ... (and) corrective and/or |
| disciplinary measures." |
|
|
| Goggans, 25, runs an on-line electronic "magazine" for computer hackers |
| called Phrack, which caters to what he calls the "computer underground." He |
| is also a computer engineer at an Austin firm, which he refuses to name. |
|
|
| The manual recently arrived at Goggans' post office box in a white |
| envelope with no return address, save a postmark from a Silicon Valley |
| location, he says. Convinced it was authentic, he typed it into his computer, |
| then copied it into the latest issue of Phrack. |
|
|
| Other hackers, like Grady Ward of Arcata, Humboldt County, and Jeff |
| Leroy Davis of Laramie, Wyo., redistributed the electronic files to computer |
| users' groups. These included one run by the Cambridge, Mass.-based |
| Electronic Frontier Foundation, which fights to protect free speech on |
| computer networks. |
|
|
| Ward said he helped redistribute the NSA manual "to embarrass the NSA" |
| and prove that even the U.S. government's most covert agency can't keep |
| documents secret. |
|
|
| The action also was aimed at undermining a federal push for |
| data-encryption regulations that would let the government tap into computer |
| networks, Ward said. |
|
|
| [Yeah...sure it was, Grady.] |
| ------------------------------------------------------------------------------ |
|
|
| Hackers Stored Pornography in Computers at Weapons Lab July 13, 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Adam S. Bauman (Virginian-Pilot and Ledger-Star) (Page A6) |
|
|
| One of the nation's three nuclear weapons labs has confirmed that |
| computer hackers were using its computers to store and distribute |
| hard-core pornography. |
|
|
| The offending computer, which was shut down after a Los Angeles Times |
| reporter investigating Internet hacking alerted lab officials, contained |
| more than 1,000 pornographic images. It was believed to be the largest |
| cache of illegal hardcore pornography ever found on a computer network. |
|
|
| At Lawrence Livermore, officials said Monday that they believed at least |
| one lab employee was involved in the pornography ring, along with an |
| undetermined number of outside collaborators. |
|
|
| [Uh, let me see if I can give this one a go: |
|
|
| A horny lab technician at LLNL.GOV uudecoded gifs for days on end |
| from a.b.p.e. After putting them up on an FSP site, a nosey schlock |
| reporter blew the whistle, and wrote up a big "hacker-scare" article. |
|
|
| The top-notch CIAC team kicked the horn-dog out the door, and began |
| frantically scouring the big Sun network at LLNL for other breaches, |
| all the while scratching their heads at how to block UDP-based apps |
| like FSP at their firewall. MPEGs at 11. |
|
|
| How does shit like this get printed????] |
|
|
| ------------------------------------------------------------------------------ |
|
|
| Clipper Flaw May Thwart Fed Effort June 6, 1994 |
| by Aaron Zitner (Boston Globe) |
|
|
| Patents, Technical Snares May Trip Up the 'Clipper' June 6, 1994 |
| by Sharon Fisher (Communications Week) (Page 1) |
|
|
| [Clipper, Flipper, Slipper. It's all a big mess, and has obsoleted |
| itself. But, let's sum up the big news: |
|
|
| How the Clipper technology is SUPPOSED to work |
|
|
| 1) Before an encoded message can be sent, a clipper computer chip |
| assigns and tests a scrambled group of numbers called a LEAF, for |
| Law Enforcement Access Field. The LEAF includes the chip's serial |
| number, a "session key" number that locks the message and a "checksum" |
| number that verifies the validity of the session key. |
|
|
| 2) With a warrant to wiretap, a law-enforcement agency like the FBI |
| could record the message and identify the serial number of a Clipper |
| chip. It would then retrieve from custodial agencies the two halves of |
| that chip's decoding key. |
|
|
| 3) Using both halves of the decoding key, the FBI would be able to |
| unscramble the session key number, thus unlocking the messages or data |
| that had been protected. |
|
|
| How the Clipper technology is FLAWED (YAY, Matt Blaze!) |
|
|
| 1) Taking advantage of design imperfections, people trying to defeat |
| the system could replace the LEAF until it erroneously passed the |
| "checksum" verification, despite an invalid session-key number. |
|
|
| 2) The FBI would still be able to retrieve a decoding key, but it would |
| prove useless. |
|
|
| 3) Because the decoding key would not be able to unscramble the invalid |
| session key, the message would remain locked.] |
|
|