| ---[ Phrack Magazine Volume 8, Issue 52 January 26, 1998, article 05 of 20 |
|
|
|
|
| ---------[ EVERYTHING A HACKER NEEDS TO KNOW ABOUT GETTING BUSTED BY THE FEDS |
|
|
|
|
| --------[ Agent Steal <agentsteal@usa.net> |
|
|
|
|
| From Federal Prison, 1997 |
|
|
| Contributions and editing by Minor Threat |
|
|
| Special thanks to Evian S. Sim |
|
|
| NOTICE: The following document is to be construed as "Legal Material" as set |
| forth in The Federal Bureau of Prisons policy statement, P.S. 1315.05, and as |
| codified in 28 C.F.R. 543.10-16 |
|
|
| This article may be freely reproduced, in whole or in part, provided |
| acknowledgments are given to the author. Any reproduction for profit, lame |
| zines, (that means you t0mmy, el8, thief) or law enforcement use is prohibited. |
| The author and contributor to this phile in no way advocate criminal behavior. |
|
|
| ---------------- |
| CONTENTS |
| ---------------- |
|
|
| INTRODUCTION |
|
|
| PART I - FEDERAL CRIMINAL LAW PART II - FEDERAL PRISON |
|
|
| A. Relevant Conduct A. State v. Federal |
| B. Preparing for Trial B. Security Levels |
| C. Plea Agreements and Attorneys C. Getting Designated |
| D. Conspiracy D. Ignorant Inmates |
| E. Sentencing E. Population |
| F. Use of Special Skill F. Doing Time |
| G. Getting Bail G. Disciplinary Action |
| H. State v. Federal Charges H. Administrative Remedy |
| I. Cooperating I. Prison Officials |
| J. Still Thinking About Trial J. The Hole |
| K. Search and Seizure K. Good Time |
| L. Surveillance L. Halfway House |
| M. Presentence Investigation M. Supervised Release |
| N. Proceeding Pro Se |
| O. Evidentiary Hearing |
| P. Return of Property |
| Q. Outstanding Warrants |
| R. Encryption |
| S. Summary |
|
|
| Part III - 2600 Special Section: |
|
|
| A. How to Avoid Detection |
| B. The Stealth Box |
| C. More Protection |
|
|
| CLOSURE |
|
|
|
|
|
|
| INTRODUCTION |
|
|
| The likelihood of getting arrested for computer hacking has increased |
| to an unprecedented level. No matter how precautionary or sage you are, you're |
| bound to make mistakes. And the fact of the matter is if you have trusted |
| anyone else with the knowledge of what you are involved in, you have made your |
| first mistake. |
|
|
| For anyone active in hacking I cannot begin to stress the importance |
| of the information contained in this file. To those who have just been |
| arrested by the Feds, reading this file could mean the difference between a |
| three-year or a one-year sentence. To those who have never been busted, |
| reading this file will likely change the way you hack, or stop you from |
| hacking altogether. |
|
|
| I realize my previous statements are somewhat lofty, but in the 35 |
| months I spent incarcerated I've heard countless inmates say it: "If I knew |
| then what I know now..." I doubt that anyone would disagree: The criminal |
| justice system is a game to be played, both by prosecution and defense. And if |
| you have to be a player, you would be wise to learn the rules of engagement. |
| The writer and contributors of this file have learned the hard way. As a |
| result we turned our hacking skills during the times of our incarceration |
| towards the study of criminal law and, ultimately, survival. Having filed our |
| own motions, written our own briefs and endured life in prison, we now pass |
| this knowledge back to the hacker community. Learn from our experiences... |
| and our mistakes. |
| |
| - Agent Steal |
|
|
|
|
| PART I - FEDERAL CRIMINAL LAW |
|
|
| A. THE BOTTOM LINE - RELEVANT CONDUCT |
|
|
| For those of you with a short G-phile attention span I'm going to |
| cover the single most important topic first. This is probably the most |
| substantial misunderstanding of the present criminal justice system. The |
| subject I am talking about is referred to in legal circles as "relevant |
| conduct." It's a bit complex and I will get into this... However, I have to |
| make this crystal clear so that it will stick in your heads. It boils down to |
| two concepts: |
|
|
| I. ONCE YOU ARE FOUND GUILTY OF EVEN ONE COUNT, EVERY COUNT WILL BE USED TO |
| CALCULATE YOUR SENTENCE |
|
|
| Regardless of whether you plea bargain to one count or 100, your |
| sentence will be the same. This is assuming we are talking about hacking, |
| code abuse, carding, computer trespass, property theft, etc. All of these are |
| treated the same. Other crimes you committed (but were not charged with) will |
| also be used to calculate your sentence. You do not have to be proven guilty |
| of every act. As long as it appears that you were responsible, or someone |
| says you were, then it can be used against you. I know this sounds insane , |
| but it's true; it's the preponderance of evidence standard for relevant |
| conduct. This practice includes using illegally seized evidence and |
| acquittals as information in increasing the length of your sentence. |
|
|
| II. YOUR SENTENCE WILL BE BASED ON THE TOTAL MONETARY LOSS |
|
|
| The Feds use a sentencing table to calculate your sentence. It's |
| simple; More Money = More Time. It doesn't matter if you tried to break in 10 |
| times or 10,000 times. Each one could be a count but it's the loss that |
| matters. And an unsuccessful attempt is treated the same as a completed crime. |
| It also doesn't matter if you tried to break into one company's computer or 10. |
| The government will quite simply add all of the estimated loss figures up, and |
| then refer to the sentencing table. |
|
|
| B. PREPARING FOR TRIAL |
|
|
| I've been trying to be overly simplistic with my explanation. The |
| United States Sentencing Guidelines (U.S.S.G.), are in fact quite complex. So |
| much so that special law firms are forming that deal only with sentencing. If |
| you get busted, I would highly recommend hiring one. In some cases it might |
| be wise to avoid hiring a trial attorney and go straight to one of these "Post |
| Conviction Specialists." Save your money, plead out, do your time. This may |
| sound a little harsh, but considering the fact that the U.S. Attorney's Office |
| has a 95% conviction rate, it may be sage advice. However, I don't want to |
| gloss over the importance of a ready for trial posturing. If you have a |
| strong trial attorney, and have a strong case, it will go a long way towards |
| good plea bargain negotiations. |
|
|
| C. PLEA AGREEMENTS AND ATTORNEYS |
|
|
| Your attorney can be your worst foe or your finest advocate. Finding |
| the proper one can be a difficult task. Costs will vary and typically the |
| attorney asks you how much cash you can raise and then says, "that amount will |
| be fine". In actuality a simple plea and sentencing should run you around |
| $15,000. Trial fees can easily soar into the 6 figure category. And finally, |
| a post conviction specialist will charge $5000 to $15,000 to handle your |
| sentencing presentation with final arguments. |
|
|
| You may however, find yourself at the mercy of The Public Defenders |
| Office. Usually they are worthless, occasionally you'll find one that will |
| fight for you. Essentially it's a crap shoot. All I can say is if you don't |
| like the one you have, fire them and hope you get appointed a better one. If |
| you can scrape together $5000 for a sentencing (post conviction) specialist to |
| work with your public defender I would highly recommend it. This specialist |
| will make certain the judge sees the whole picture and will argue in the most |
| effective manner for a light or reasonable sentence. Do not rely on your |
| public defender to thoroughly present your case. Your sentencing hearing is |
| going to flash by so fast you'll walk out of the court room dizzy. You and |
| your defense team need to go into that hearing fully prepared, having already |
| filed a sentencing memorandum. |
|
|
| The plea agreement you sign is going to affect you and your case well |
| after you are sentenced. Plea agreements can be tricky business and if you |
| are not careful or are in a bad defense position (the case against you is |
| strong), your agreement may get the best of you. There are many issues in a |
| plea to negotiate over. But essentially my advice would be to avoid signing |
| away your right to appeal. Once you get to a real prison with real jailhouse |
| lawyers you will find out how bad you got screwed. That issue notwithstanding, |
| you are most likely going to want to appeal. This being the case you need to |
| remember two things: bring all your appealable issues up at sentencing and |
| file a notice of appeal within 10 days of your sentencing. Snooze and loose. |
|
|
| I should however, mention that you can appeal some issues even though |
| you signed away your rights to appeal. For example, you can not sign away |
| your right to appeal an illegal sentence. If the judge orders something that |
| is not permissible by statute, you then have a constitutional right to appeal |
| your sentence. |
|
|
| I will close this subpart with a prison joke. Q: How can you tell when |
| your attorney is lying? A: You can see his lips moving. |
|
|
| D. CONSPIRACY |
|
|
| Whatever happened to getting off on a technicality? I'm sorry to say |
| those days are gone, left only to the movies. The courts generally dismiss |
| many arguments as "harmless error" or "the government acted in good faith". |
| The most alarming trend, and surely the root of the prosecutions success, are |
| the liberally worded conspiracy laws. Quite simply, if two or more people |
| plan to do something illegal, then one of them does something in furtherance |
| of the objective (even something legal), then it's a crime. Yes, it's true. |
| In America it's illegal to simply talk about committing a crime. Paging Mr. |
| Orwell. Hello? |
|
|
| Here's a hypothetical example to clarify this. Bill G. and Marc A. are |
| hackers (can you imagine?) Bill and Marc are talking on the phone and |
| unbeknownst to them the FBI is recording the call. They talk about hacking |
| into Apple's mainframe and erasing the prototype of the new Apple Web Browser. |
| Later that day, Marc does some legitimate research to find out what type of |
| mainframe and operating system Apple uses. The next morning, the Feds raid |
| Marc's house and seize everything that has wires. Bill and Marc go to trial |
| and spend millions to defend themselves. They are both found guilty of |
| conspiracy to commit unauthorized access to a computer system. |
|
|
| E. SENTENCING |
|
|
| At this point it is up to the probation department to prepare a report |
| for the court. It is their responsibility to calculate the loss and identify |
| any aggravating or mitigating circumstances. Apple Computer Corporation |
| estimates that if Bill and Marc would have been successful it would have |
| resulted in a loss of $2 million. This is the figure the court will use. |
| Based on this basic scenario our dynamic duo would receive roughly three-year |
| sentences. |
|
|
| As I mentioned, sentencing is complex and many factors can decrease or |
| increase a sentence, usually the latter. Let's say that the FBI also found a |
| file on Marc's computer with 50,000 unauthorized account numbers and passwords |
| to The Microsoft Network. Even if the FBI does not charge him with this, it |
| could be used to increase his sentence. Generally the government places a |
| $200-per-account attempted loss on things of this nature (i.e. credit card |
| numbers and passwords = access devices). This makes for a $10 million loss. |
| Coupled with the $2 million from Apple, Marc is going away for about nine |
| years. Fortunately there is a Federal Prison not too far from Redmond, WA so |
| Bill could come visit him. |
|
|
| Some of the other factors to be used in the calculation of a sentence |
| might include the following: past criminal record, how big your role in the |
| offense was, mental disabilities, whether or not you were on probation at the |
| time of the offense, if any weapons were used, if any threats were used, if |
| your name is Kevin Mitnick (heh), if an elderly person was victimized, if you |
| took advantage of your employment position, if you are highly trained and used |
| your special skill, if you cooperated with the authorities, if you show |
| remorse, if you went to trial, etc. |
|
|
| These are just some of the many factors that could either increase or |
| decrease a sentence. It would be beyond the scope of this article to cover |
| the U.S.S.G. in complete detail. I do feel that I have skipped over some |
| significant issues. Nevertheless, if you remember my two main points in |
| addition to how the conspiracy law works, you'll be a long way ahead in |
| protecting yourself. |
|
|
| F. USE OF A SPECIAL SKILL |
|
|
| The only specific "sentencing enhancement" I would like to cover would |
| be one that I am responsible for setting a precedent with. In U.S. v Petersen, |
| 98 F.3d. 502, 9th Cir., the United States Court of Appeals held that some |
| computer hackers may qualify for the special skill enhancement. What this |
| generally means is a 6 to 24 month increase in a sentence. In my case it |
| added eight months to my 33-month sentence bringing it to 41 months. |
| Essentially the court stated that since I used my "sophisticated" hacking |
| skills towards a legitimate end as a computer security consultant, then the |
| enhancement applies. It's ironic that if I were to have remained strictly a |
| criminal hacker then I would have served less time. |
|
|
| The moral of the story is that the government will find ways to give |
| you as much time as they want to. The U.S.S.G. came into effect in 1987 in an |
| attempt to eliminate disparity in sentencing. Defendants with similar crimes |
| and similar backgrounds would often receive different sentences. Unfortunately, |
| this practice still continues. The U.S.S.G. are indeed a failure. |
|
|
| G. GETTING BAIL |
|
|
| In the past, the Feds might simply have executed their raid and then |
| left without arresting you. Presently this method will be the exception |
| rather than the rule and it is more likely that you will be taken into custody |
| at the time of the raid. Chances are also good that you will not be released |
| on bail. This is part of the government's plan to break you down and win their |
| case. If they can find any reason to deny you bail they will. In order to |
| qualify for bail, you must meet the following criteria: |
|
|
| - You must be a resident of the jurisdiction in which you were arrested. |
| - You must be gainfully employed or have family ties to the area. |
| - You cannot have a history of failure to appear or escape. |
| - You cannot be considered a danger or threat to the community. |
|
|
| In addition, your bail can be denied for the following reasons: |
|
|
| - Someone came forward and stated to the court that you said you would flee if |
| released. |
| - Your sentence will be long if convicted. |
| - You have a prior criminal history. |
| - You have pending charges in another jurisdiction. |
|
|
| What results from all this "bail reform" is that only about 20% of |
| persons arrested make bail. On top of that it takes 1-3 weeks to process your |
| bail papers when property is involved in securing your bond. |
|
|
| Now you're in jail, more specifically you are either in an |
| administrative holding facility or a county jail that has a contract with the |
| Feds to hold their prisoners. Pray that you are in a large enough city to |
| justify its own Federal Detention Center. County jails are typically the last |
| place you would want to be. |
| |
| H. STATE VS. FEDERAL CHARGES |
|
|
| In some cases you will be facing state charges with the possibility of |
| the Feds "picking them up." You may even be able to nudge the Feds into |
| indicting you. This is a tough decision. With the state you will do |
| considerably less time, but will face a tougher crowd and conditions in prison. |
| Granted, Federal Prisons can be violent too, but generally as a non-violent |
| white collar criminal you will eventually be placed into an environment with |
| other low security inmates. More on this later. |
|
|
| Until you are sentenced, you will remain as a "pretrial inmate" in |
| general population with other inmates. Some of the other inmates will be |
| predatorial but the Feds do not tolerate much nonsense. If someone acts up, |
| they'll get thrown in the hole. If they continue to pose a threat to the |
| inmate population, they will be left in segregation (the hole). Occasionally |
| inmates that are at risk or that have been threatened will be placed in |
| segregation. This isn't really to protect the inmate. It is to protect the |
| prison from a lawsuit should the inmate get injured. |
|
|
| I. COOPERATING |
|
|
| Naturally when you are first arrested the suits will want to talk to |
| you. First at your residence and, if you appear to be talkative, they will |
| take you back to their offices for an extended chat and a cup of coffee. My |
| advice at this point is tried and true and we've all heard it before: remain |
| silent and ask to speak with an attorney. Regardless of what the situation is, |
| or how you plan to proceed, there is nothing you can say that will help you. |
| Nothing. Even if you know that you are going to cooperate, this is not the |
| time. |
|
|
| This is obviously a controversial subject, but the fact of the matter |
| is roughly 80% of all defendants eventually confess and implicate others. This |
| trend stems from the extremely long sentences the Feds are handing out these |
| days. Not many people want to do 10 to 20 years to save their buddies' hides |
| when they could be doing 3 to 5. This is a decision each individual needs to |
| make. My only advice would be to save your close friends and family. Anyone |
| else is fair game. In the prison system the blacks have a saying "Getting |
| down first." It's no secret that the first defendant in a conspiracy is |
| usually going to get the best deal. I've even seen situations where the big |
| fish turned in all his little fish and received 40% off his sentence. |
|
|
| Incidentally, being debriefed or interrogated by the Feds can be an |
| ordeal in itself. I would -highly- recommend reading up on interrogation |
| techniques ahead of time. Once you know their methods it will be all quite |
| transparent to you and the debriefing goes much more smoothly. |
|
|
| When you make a deal with the government you're making a deal with the |
| devil himself. If you make any mistakes they will renege on the deal and |
| you'll get nothing. On some occasions the government will trick you into |
| thinking they want you to cooperate when they are not really interested in |
| anything you have to say. They just want you to plead guilty. When you sign |
| the cooperation agreement there are no set promises as to how much of a |
| sentence reduction you will receive. That is to be decided after your |
| testimony, etc. and at the time of sentencing. It's entirely up to the judge. |
| However, the prosecution makes the recommendation and the judge generally goes |
| along with it. In fact, if the prosecution does not motion the court for your |
| "downward departure" the courts' hands are tied and you get no break. |
|
|
| As you can see, cooperating is a tricky business. Most people, |
| particularly those who have never spent a day in jail, will tell you not to |
| cooperate. "Don't snitch." This is a noble stance to take. However, in some |
| situations this is just plain stupid. Saving someone's ass who would easily |
| do the same to you is a tough call. It's something that needs careful |
| consideration. Like I said, save your friends then do what you have to do to |
| get out of prison and on with your life. |
|
|
| I'm happy to say that I was able to avoid involving my good friends |
| and a former employer in the massive investigation that surrounded my case. It |
| wasn't easy. I had to walk a fine line. Many of you probably know that I |
| (Agent Steal) went to work for the FBI after I was arrested. I was |
| responsible for teaching several agents about hacking and the culture. What |
| many of you don't know is that I had close FBI ties prior to my arrest. I was |
| involved in hacking for over 15 years and had worked as a computer security |
| consultant. That is why I was given that opportunity. It is unlikely however, |
| that we will see many more of these types of arrangements in the future. Our |
| relationship ran afoul, mostly due to their passive negligence and lack of |
| experience in dealing with hackers. The government in general now has their |
| own resources, experience, and undercover agents within the community. They |
| no longer need hackers to show them the ropes or the latest security hole. |
|
|
| Nevertheless, if you are in the position to tell the Feds something |
| they don't know and help them build a case against someone, you may qualify |
| for a sentence reduction. The typical range is 20% to 70%. Usually it's |
| around 35% to 50%. Sometimes you may find yourself at the end of the |
| prosecutorial food chain and the government will not let you cooperate. Kevin |
| Mitnick would be a good example of this. Even if he wanted to roll over, I |
| doubt it would get him much. He's just too big of a fish, too much media. My |
| final advice in this matter is get the deal in writing before you start |
| cooperating. |
|
|
| The Feds also like it when you "come clean" and accept responsibility. |
| There is a provision in the Sentencing Guidelines, 3E1.1, that knocks a little |
| bit of time off if you confess to your crime, plead guilty and show remorse. |
| If you go to trial, typically you will not qualify for this "acceptance of |
| responsibility" and your sentence will be longer. |
|
|
| J. STILL THINKING ABOUT TRIAL |
|
|
| Many hackers may remember the Craig Neidorf case over the famous 911 |
| System Operation documents. Craig won his case when it was discovered that |
| the manual in question, that he had published in Phrack magazine, was not |
| proprietary as claimed but available publicly from AT&T. It was an egg in |
| the face day for the Secret Service. |
|
|
| Don't be misled by this. The government learned a lot from this |
| fiasco and even with the laudable support from the EFF, Craig narrowly |
| thwarted off a conviction. Regardless, it was a trying experience (no pun |
| intended) for him and his attorneys. The point I'm trying to make is that it's |
| tough to beat the Feds. They play dirty and will do just about anything, |
| including lie, to win their case. If you want to really win you need to know |
| how they build a case in the first place. |
|
|
| K. SEARCH AND SEIZURE |
|
|
| There is a document entitled "Federal Guidelines For Searching And |
| Seizing Computers." It first came to my attention when it was published in |
| the 12-21-94 edition of the Criminal Law Reporter by the Bureau of National |
| Affairs (Cite as 56 CRL 2023 ). It's an intriguing collection of tips, cases, |
| mistakes and, in general, how to bust computer hackers. It's recommended |
| reading. |
|
|
| Search and seizure is an ever evolving jurisprudence. What's not |
| permissible today may, through some convoluted Supreme Court logic, be |
| permissible and legal tomorrow. Again, a complete treatment of this subject |
| is beyond the scope of this paper. But suffice it to say if a Federal agent |
| wants to walk right into your bedroom and seize all of your computer equipment |
| without a warrant he could do it by simply saying he had probable cause (PC). |
| PC is anything that gives him an inkling to believe you were committing a |
| crime. Police have been known to find PC to search a car when the trunk sat |
| too low to the ground or the high beams were always on. |
|
|
| L. SURVEILLANCE AND WIRETAPS |
|
|
| Fortunately the Feds still have to show a little restraint when |
| wielding their wiretaps. It requires a court order and they have to show that |
| there is no other way to obtain the information they seek, a last resort if |
| you will. Wiretaps are also expensive to operate. They have to lease lines |
| from the phone company, pay agents to monitor it 24 hours a day and then |
| transcribe it. If we are talking about a data tap, there are additional costs. |
| Expensive interception/translation equipment must be in place to negotiate the |
| various modem speeds. Then the data has to be stored, deciphered, |
| decompressed, formatted, protocoled, etc. It's a daunting task and usually |
| reserved for only the highest profile cases. If the Feds can seize the data |
| from any other source, like the service provider or victim, they will take |
| that route. I don't know what they hate worse though, asking for outside help |
| or wasting valuable internal resources. |
|
|
| The simplest method is to enlist the help of an informant who will |
| testify "I saw him do it!," then obtain a search warrant to seize the evidence |
| on your computer. Ba da boom, ba da busted. |
|
|
| Other devices include a pen register which is a device that logs every |
| digit you dial on your phone and the length of the calls, both incoming and |
| outgoing. The phone companies keep racks of them at their security |
| departments. They can place one on your line within a day if they feel you are |
| defrauding them. They don't need a court order, but the Feds do. |
|
|
| A trap, or trap and trace, is typically any method the phone company |
| uses to log every number that calls a particular number. This can be done on |
| the switching system level or via a billing database search. The Feds need a |
| court order for this information too. However, I've heard stories of |
| cooperative telco security investigations passing the information along to an |
| agent. Naturally that would be a "harmless error while acting in good faith." |
| (legal humor)... |
|
|
| I'd love to tell you more about FBI wiretaps but this is as far as I |
| can go without pissing them off. Everything I've told you thus far is public |
| knowledge. So I think I'll stop here. If you really want to know more, catch |
| Kevin Poulsen (Dark Dante) at a cocktail party, buy him a Coke and he'll give |
| you an earful. (hacker humor) |
|
|
| In closing this subpart I will say that most electronic surveillance |
| is backed up with at least part-time physical surveillance. The Feds are |
| often good at following people around. They like late model mid-sized |
| American cars, very stock, with no decals or bumper stickers. If you really |
| want to know if you're under surveillance, buy an Opto-electronics Scout or |
| Xplorer frequency counter. Hide it on your person, stick an ear plug in your |
| ear (for the Xplorer) and take it everywhere you go. If you hear people |
| talking about you, or you continue to hear intermittent static (encrypted |
| speech), you probably have a problem. |
|
|
| M. YOUR PRESENTENCE INVESTIGATION REPORT, PSI OR PSR |
|
|
| After you plead guilty you will be dragged from the quiet and comfort |
| of your prison cell to meet with a probation officer. This has absolutely |
| nothing to do with getting probation. Quite the contrary. The P.O. is |
| empowered by the court to prepare a complete and, in theory, unbiased profile |
| of the defendant. Everything from education, criminal history, psychological |
| behavior, offense characteristics plus more will be included in this |
| voluminous and painfully detailed report about your life. Every little dirty |
| scrap of information that makes you look like a sociopath, demon worshiping, |
| loathsome criminal will be included in this report. They'll put a few negative |
| things in there as well. |
|
|
| My advice is simple. Be careful what you tell them. Have your |
| attorney present and think about how what you say can be used against you. |
| Here's an example: |
|
|
| P.O.: Tell me about your education and what you like to do in your spare time. |
|
|
| Mr. Steal: I am preparing to enroll in my final year of college. In my spare |
| time I work for charity helping orphan children. |
|
|
| The PSR then reads "Mr. Steal has never completed his education and hangs |
| around with little children in his spare time." Get the picture? |
|
|
| J. PROCEEDING PRO SE |
|
|
| Pro Se or Pro Per is when a defendant represents himself. A famous |
| lawyer once said "a man that represents himself has a fool for a client." |
| Truer words were never spoken. However, I can't stress how important it is to |
| fully understand the criminal justice system. Even if you have a great |
| attorney it's good to be able to keep an eye on him or even help out. An |
| educated client's help can be of enormous benefit to an attorney. They may |
| think you're a pain in the ass but it's your life. Take a hold of it. |
| Regardless, representing yourself is generally a mistake. |
|
|
| However, after your appeal, when your court appointed attorney runs |
| out on you, or you have run out of funds, you will be forced to handle matters |
| yourself. At this point there are legal avenues, although quite bleak, for |
| post-conviction relief. |
|
|
| But I digress. The best place to start in understanding the legal |
| system lies in three inexpensive books. First the Federal Sentencing |
| Guidelines ($14.00) and Federal Criminal Codes and Rules ($20.00) are |
| available from West Publishing at 800-328-9352. I consider possession of |
| these books to be mandatory for any pretrial inmate. Second would be the |
| Georgetown Law Journal, available from Georgetown University Bookstore in |
| Washington, DC. The book sells for around $40.00 but if you write them a |
| letter and tell them you're a Pro Se litigant they will send it for free. And |
| last but not least the definitive Pro Se authority, "The Prisoners Self Help |
| Litigation Manual" $29.95 ISBN 0-379-20831-8. Or try |
| http://www.oceanalaw.com/books/n148.htm |
|
|
| O. EVIDENTIARY HEARING |
|
|
| If you disagree with some of the information presented in the |
| presentence report (PSR) you may be entitled to a special hearing. This can |
| be instrumental in lowering your sentence or correcting your PSR. One |
| important thing to know is that your PSR will follow you the whole time you |
| are incarcerated. The Bureau of Prisons uses the PSR to decide how to handle |
| you. This can affect your security level, your halfway house, your |
| eligibility for the drug program (which gives you a year off your sentence), |
| and your medical care. So make sure your PSR is accurate before you get |
| sentenced! |
|
|
| P. GETTING YOUR PROPERTY BACK |
|
|
| In most cases it will be necessary to formally ask the court to have |
| your property returned. They are not going to just call you up and say "Do |
| you want this Sparc Station back or what?" No, they would just as soon keep it |
| and not asking for it is as good as telling them they can have it. |
|
|
| You will need to file a 41(e) "Motion For Return Of Property." The |
| courts' authority to keep your stuff is not always clear and will have to be |
| taken on a case-by-case basis. They may not care and the judge will simply |
| order that it be returned. |
|
|
| If you don't know how to write a motion, just send a formal letter to |
| the judge asking for it back. Tell him you need it for your job. This should |
| suffice, but there may be a filing fee. |
|
|
| Q. OUTSTANDING WARRANTS |
|
|
| If you have an outstanding warrant or charges pending in another |
| jurisdiction you would be wise to deal with them as soon as possible -after- |
| you are sentenced. If you follow the correct procedure chances are good the |
| warrants will be dropped (quashed). In the worst case scenario, you will be |
| transported to the appropriate jurisdiction, plead guilty and have your "time |
| run concurrent." Typically in non-violent crimes you can serve several |
| sentences all at the same time. Many Federal inmates have their state time |
| run with their Federal time. In a nutshell: concurrent is good, consecutive |
| bad. |
|
|
| This procedure is referred to as the Interstate Agreement On Detainers |
| Act (IADA). You may also file a "demand for speedy trial", with the |
| appropriate court. This starts the meter running. If they don't extradite |
| you within a certain period of time, the charges will have to be dropped. The |
| "Inmates' Self-Help Litigation Manual" that I mentioned earlier covers this |
| topic quite well. |
|
|
| R. ENCRYPTION |
|
|
| There are probably a few of you out there saying, "I triple DES |
| encrypt my hard drive and 128 character RSA public key it for safety." Well, |
| that's just great, but... the Feds can have a grand jury subpoena your |
| passwords and if you don't give them up you may be charged with obstruction of |
| justice. Of course who's to say otherwise if you forgot your password in all |
| the excitement of getting arrested. I think I heard this once or twice before |
| in a Senate Sub-committee hearing. "Senator, I have no recollection of the |
| aforementioned events at this time." But seriously, strong encryption is |
| great. However, it would be foolish to rely on it. If the Feds have your |
| computer and access to your encryption software itself, it is likely they |
| could break it given the motivation. If you understand the true art of code |
| breaking you should understand this. People often overlook the fact that your |
| password, the one you use to access your encryption program, is typically less |
| than 8 characters long. By attacking the access to your encryption program |
| with a keyboard emulation sequencer your triple DES/128 bit RSA crypto is |
| worthless. Just remember, encryption may not protect you. |
|
|
| S. LEGAL SUMMARY |
|
|
| Before I move on to the Life in Prison subpart, let me tell you what |
| this all means. You're going to get busted, lose everything you own, not get |
| out on bail, snitch on your enemies, get even more time than you expected and |
| have to put up with a bunch of idiots in prison. Sound fun? Keep hacking. |
| And, if possible, work on those sensitive .gov sites. That way they can hang |
| an espionage rap on you. That will carry about 12 to 18 years for a first |
| time offender. |
|
|
| I know this may all sound a bit bleak, but the stakes for hackers have |
| gone up and you need to know what they are. Let's take a look at some recent |
| sentences: |
|
|
| Agent Steal (me) 41 months |
| Kevin Poulsen 51 months |
| Minor Threat 70 months |
| Kevin Mitnick estimated 7-9 years |
|
|
| As you can see, the Feds are giving out some time now. If you are |
| young, a first-time offender, unsophisticated (like MOD), and were just |
| looking around in some little company's database, you might get probation. But |
| chances are that if that is all you were doing, you would have been passed |
| over for prosecution. As a rule, the Feds won't take the case unless $10,000 |
| in damages are involved. The problem is who is to say what the loss is? The |
| company can say whatever figure it likes and it would be tough to prove |
| otherwise. They may decide to, for insurance purposes, blame some huge |
| downtime expense on you. I can hear it now, "When we detected the intruder, |
| we promptly took our system off-line. It took us two weeks to bring it up |
| again for a loss in wasted manpower of $2 million." In some cases you might |
| be better off just using the company's payroll system to cut you a couple of |
| $10,000 checks. That way the government has a firm loss figure. This would |
| result in a much shorter sentence. I'm not advocating blatant criminal actions. |
| I just think the sentencing guidelines definitely need some work. |
|
|
|
|
| PART II - FEDERAL PRISON |
|
|
|
|
| A. STATE v. FEDERAL |
|
|
| In most cases I would say that doing time in a Federal Prison is better |
| than doing time in the state institutions. Some state prisons are such |
| violent and pathetic places that it's worth doing a little more time in the |
| Federal system. This is going to be changing however. The public seems to |
| think that prisons are too comfortable and as a result Congress has passed a |
| few bills to toughen things up. |
|
|
| Federal prisons are generally going to be somewhat less crowded, |
| cleaner, and more laid back. The prison I was at looked a lot like a college |
| campus with plenty of grass and trees, rolling hills, and stucco buildings. I |
| spent most of my time in the library hanging out with Minor Threat. We would |
| argue over who was more elite. "My sentence was longer," he would argue. "I |
| was in more books and newspapers," I would rebut. (humor) |
|
|
| Exceptions to the Fed is better rule would be states that permit |
| televisions and word processors in your cell. As I sit here just prior to |
| release scribbling this article with pen and paper I yearn for even a Smith |
| Corona with one line display. The states have varying privileges. You could |
| wind up someplace where everything gets stolen from you. There are also |
| states that are abolishing parole, thus taking away the ability to get out |
| early with good behavior. That is what the Feds did. |
|
|
| B. SECURITY LEVELS |
|
|
| The Bureau of Prisons (BOP) has six security levels. Prisons are |
| assigned a security level and only prisoners with the appropriate ratings are |
| housed there. Often the BOP will have two or three facilities at one location. |
| Still, they are essentially separate prisons, divided by fences. |
|
|
| The lowest level facility is called a minimum, a camp, or FPC. |
| Generally speaking, you will find first time, non-violent offenders with less |
| than 10 year sentences there. Camps have no fences. Your work assignment at |
| a camp is usually off the prison grounds at a nearby military base. Other |
| times camps operate as support for other nearby prisons. |
|
|
| The next level up is a low Federal Correctional Institution (FCI). |
| These are where you find a lot of people who should be in a camp but for some |
| technical reason didn't qualify. There is a double fence with razor wire |
| surrounding it. Again you will find mostly non-violent types here. You would |
| really have to piss someone off before they would take a swing at you. |
|
|
| Moving up again we get to medium and high FCI's which are often |
| combined. More razor wire, more guards, restricted movement and a rougher |
| crowd. It's also common to find people with 20 or 30+ year sentences. |
| Fighting is much more common. Keep to yourself, however, and people generally |
| leave you alone. Killings are not too terribly common. With a prison |
| population of 1500-2000, about one or two a year leave on a stretcher and don't |
| come back. |
|
|
| The United States Penitentiary (U.S.P.) is where you find the murderers, |
| rapists, spies and the roughest gang bangers. "Leavenworth" and "Atlanta" are |
| the most infamous of these joints. Traditionally surrounded by a 40 foot |
| brick wall, they take on an ominous appearance. The murder rate per prison |
| averages about 30 per year with well over 250 stabbings. |
|
|
| The highest security level in the system is Max, sometimes referred to |
| as "Supermax." Max custody inmates are locked down all the time. Your mail is |
| shown to you over a TV screen in your cell. The shower is on wheels and it |
| comes to your door. You rarely see other humans and if you do leave your cell |
| you will be handcuffed and have at least a three guard escort. Mr. Gotti, the |
| Mafia boss, remains in Supermax. So does Aldridge Ames, the spy. |
|
|
|
|
| C. GETTING DESIGNATED |
|
|
| Once you are sentenced, the BOP has to figure out what they want to do |
| with you. There is a manual called the "Custody and Classification Manual" |
| that they are supposed to follow. It is publicly available through the |
| Freedom of Information Act and it is also in most prison law libraries. |
| Unfortunately, it can be interpreted a number of different ways. As a result, |
| most prison officials responsible for classifying you do pretty much as they |
| please. |
|
|
| Your first classification is done by the Region Designator at BOP |
| Regional Headquarters. As a computer hacker you will most likely be placed in |
| a camp or a low FCI. This is assuming you weren't pulling bank jobs on the |
| side. -IF- you do wind up in an FCI, you should make it to a camp after six |
| months. This is assuming you behave yourself. |
|
|
| Another thing the Region Designator will do is to place a "Computer |
| No" on your file. This means you will not be allowed to operate a computer at |
| your prison work assignment. In my case I wasn't allowed to be within 10 feet |
| of one. It was explained to me that they didn't even want me to know the |
| types of software they were running. Incidentally, the BOP uses PC/Server |
| based LANs with NetWare 4.1 running on Fiber 10baseT Ethernet connections to |
| Cabletron switches and hubs. PC based gateways reside at every prison. The |
| connection to the IBM mainframe (Sentry) is done through leased lines via |
| Sprintnet's Frame Relay service with 3270 emulation software/hardware resident |
| on the local servers. Sentry resides in Washington, D.C. with SNA type |
| network concentrators at the regional offices. ;-) And I picked all of this up |
| without even trying to. Needless to say, BOP computer security is very lax. |
| Many of their publicly available "Program Statements" contain specific |
| information on how to use Sentry and what it's designed to do. They have other |
| networks as well, but this is not a tutorial on how to hack the BOP. I'll save |
| that for if they ever really piss me off. (humor) |
|
|
| Not surprisingly, the BOP is very paranoid about computer hackers. I |
| went out of my way not to be interested in their systems or to receive |
| computer security related mail. Nevertheless, they tried restricting my mail |
| on numerous occasions. After I filed numerous grievances and had a meeting |
| with the warden, they decided I was probably going to behave myself. My 20 or |
| so magazine subscriptions were permitted to come in, after a special screening. |
| Despite all of that I still had occasional problems, usually when I received |
| something esoteric in nature. It's my understanding, however, that many |
| hackers at other prisons have not been as fortunate as I was. |
|
|
| D. IGNORANT INMATES |
|
|
| You will meet some of the stupidest people on the planet in prison. I |
| suppose that is why they are there, too dumb to do anything except crime. And |
| for some strange reason these uneducated low class common thieves think they |
| deserve your respect. In fact they will often demand it. These are the same |
| people that condemn everyone who cooperated, while at the same time feel it is |
| fine to break into your house or rob a store at gunpoint. These are the types |
| of inmates you will be incarcerated with, and occasionally these inmates will |
| try to get over on you. They will do this for no reason other than the fact |
| you are an easy mark. |
|
|
| There are a few tricks hackers can do to protect themselves in prison. |
| The key to your success is acting before the problem escalates. It is also |
| important to have someone outside (preferably another hacker) that can do some |
| social engineering for you. The objective is simply to have your problem |
| inmate moved to another institution. I don't want to give away my methods but |
| if staff believes that an inmate is going to cause trouble, or if they believe |
| his life is in danger, they will move him or lock him away in segregation. |
| Social engineered letters (official looking) or phone calls from the right |
| source to the right department will often evoke brisk action. It's also quite |
| simple to make an inmates life quite miserable. If the BOP has reason to |
| believe that an inmate is an escape risk, a suicide threat, or had pending |
| charges, they will handle them much differently. Tacking these labels on an |
| inmate would be a real nasty trick. I have a saying: "Hackers usually have |
| the last word in arguments." Indeed. |
|
|
| Chances are you won't have many troubles in prison. This especially |
| applies if you go to a camp, mind your own business, and watch your mouth. |
| Nevertheless, I've covered all of this in the event you find yourself caught |
| up in the ignorant behavior of inmates whose lives revolve around prison. And |
| one last piece of advice, don't make threats, truly stupid people are too |
| stupid to fear anything, particularly an intelligent man. Just do it. |
|
|
| E. POPULATION |
|
|
| The distribution of blacks, whites and Hispanics varies from |
| institution to institution. Overall it works out to roughly 30% white, 30% |
| Hispanic and 30% black. The remaining 10% are various other races. Some |
| joints have a high percent of blacks and vice versa. I'm not necessarily a |
| prejudiced person, but prisons where blacks are in majority are a nightmare. |
| Acting loud, disrespectful, and trying to run the place is par for the course. |
|
|
| In terms of crimes, 60% of the Federal inmate population are |
| incarcerated for drug related crimes. The next most common would be bank |
| robbery (usually for quick drug money), then various white collar crimes. The |
| Federal prison population has changed over the years. It used to be a place |
| for the criminal elite. The tough drug laws have changed all of that. |
|
|
| Just to quell the rumors, I'm going to cover the topic of prison rape. |
| Quite simply, in medium and low security level Federal prisons it is unheard |
| of. In the highs it rarely happens. When it does happen, one could argue |
| that the victim was asking for it. I heard an inmate say once, "You can't |
| make no inmate suck cock that don't wanta." Indeed. In my 41 months of |
| incarceration, I never felt in any danger. I would occasionally have inmates |
| that would subtly ask me questions to see where my preferences lie, but once I |
| made it clear that I didn't swing that way I would be left alone. Hell, I got |
| hit on more often when I was hanging out in Hollywood! |
|
|
| On the other hand, state prisons can be a hostile environment for rape |
| and fighting in general. Many of us heard how Bernie S. got beat up over use |
| of the phone. Indeed, I had to get busy a couple of times. Most prison |
| arguments occur over three simple things: the phone, the TV and money/drugs. |
| If you want to stay out of trouble in a state prison, or Federal for that |
| matter, don't use the phone too long, don't change the channel and don't get |
| involved in gambling or drugs. As far as rape goes, pick your friends |
| carefully and stick with them. And always, always, be respectful. Even if |
| the guy is a fucking idiot (and most inmates are), say excuse me. |
|
|
| My final piece of prison etiquette advice would be to never take your |
| inmate problems to "the man" (prison staff). Despite the fact that most |
| everyone in prison snitched on their co-defendants at trial, there is no |
| excuse for being a prison rat. The rules are set by the prisoners themselves. |
| If someone steps out of line there will likely be another inmate who will be |
| happy to knock him back. In some prisons inmates are so afraid of being |
| labeled a rat that they refuse to be seen talking alone with a prison staff |
| member. I should close this paragraph by stating that this bit of etiquette |
| is routinely ignored as other inmates will snitch on you for any reason |
| whatsoever. Prison is a strange environment. |
|
|
| F. DOING TIME |
|
|
| You can make what you want to out of prison. Some people sit around |
| and do dope all day. Others immerse themselves in a routine of work and |
| exercise. I studied technology and music. Regardless, prisons are no longer |
| a place of rehabilitation. They serve only to punish and conditions are only |
| going to worsen. The effect is that angry, uneducated, and unproductive |
| inmates are being released back into society. |
|
|
| While I was incarcerated in 95/96, the prison band program was still |
| in operation. I played drums for two different prison bands. It really helped |
| pass the time and when I get out I will continue with my career in music. Now |
| the program has been canceled, all because some senator wanted to be seen as |
| being tough on crime. Bills were passed in Congress. The cable TV is gone, |
| pornography mags are no longer permitted, and the weight piles are being |
| removed. All this means is that prisoners will have more spare time on their |
| hands, and so more guards will have to be hired to watch the prisoners. I |
| don't want to get started on this subject. Essentially what I'm saying is |
| make something out of your time. Study, get in to a routine and before you |
| know you'll be going home, and a better person on top of it. |
|
|
| G. DISCIPLINARY ACTIONS |
|
|
| What fun is it if you go to prison and don't get into some mischief? |
| Well, I'm happy to say the only "shots" (violations) I ever received were for |
| having a friend place a call with his three-way calling for me (you can't call |
| everyone collect), and drinking homemade wine. |-) The prison occasionally |
| monitors your phone calls and on the seven or eight hundredth time I made a |
| three-way I got caught. My punishment was ten hours of extra duty (cleaning |
| up). Other punishments for shots include loss of phone use, loss of |
| commissary, loss of visits, and getting thrown in the hole. Shots can also |
| increase your security level and can get you transferred to a higher level |
| institution. If you find yourself having trouble in this area you may want to |
| pick up the book, "How to win prison disciplinary hearings", by Alan Parmelee, |
| 206-328-2875. |
|
|
| H. ADMINISTRATIVE REMEDY |
|
|
| If you have a disagreement with the way staff is handling your case |
| (and you will) or another complaint, there is an administrative remedy |
| procedure. First you must try to resolve it informally. Then you can file a |
| form BP-9. The BP-9 goes to the warden. After that you can file a BP-10 |
| which goes to the region. Finally, a BP-11 goes to the National BOP |
| Headquarters (Central Office). The whole procedure is a joke and takes about |
| six months to complete. Delay and conquer is the BOP motto. After you |
| complete the remedy process to no avail, you may file your action in a civil |
| court. In some extreme cases you may take your case directly to the courts |
| without exhausting the remedy process. Again, the "Prisoners Self-Help |
| Litigation Manual" covers this quite well. |
|
|
| My best advice with this remedy nonsense is to keep your request brief, |
| clear, concise and only ask for one specific thing per form. Usually if you |
| "got it coming" you will get it. If you don't, or if the BOP can find any |
| reason to deny your request, they will. |
|
|
| For this reason I often took my problems outside the prison from the |
| start. If it was a substantial enough issue I would inform the media, the |
| director of the BOP, all three of my attorneys, my judge and the ACLU. Often |
| this worked. It always pissed them off. But, alas I'm a man of principle and |
| if you deprive me of my rights I'm going to raise hell. In the past I might |
| have resorted to hacker tactics, like disrupting the BOP's entire |
| communication system bringing it crashing down! But...I'm rehabilitated now. |
| Incidentally, most BOP officials and inmates have no concept of the kind of |
| havoc a hacker can wield on an individuals life. So until some hacker shows |
| the BOP which end is up you will have to accept the fact most everyone you |
| meet in prison will have only nominal respect for you. Deal with it, you're |
| not in cyberspace anymore. |
|
|
| I. PRISON OFFICIALS |
|
|
| There are two types, dumb and dumber. I've had respect for several |
| but I've never met one that impressed me as being particularly talented in a |
| way other than following orders. Typically you will find staff that are |
| either just doing their job, or staff that is determined to advance their |
| career. The latter take their jobs and themselves way too seriously. They |
| don't get anywhere by being nice to inmates so they are often quite curt. |
| Ex-military and law enforcement wannabes are commonplace. All in all they're |
| a pain in the ass but easy to deal with. Anyone who has ever been down |
| (incarcerated) for awhile knows it's best to keep a low profile. If they don't |
| know you by name you're in good shape. |
|
|
| One of the problems that computer hackers will encounter with prison |
| staff is fear and/or resentment. If you are a pretentious articulate educated |
| white boy like myself you would be wise to act a little stupid. These people |
| don't want to respect you and some of them will hate everything that you stand |
| for. Many dislike all inmates to begin with. And the concept of you someday |
| having a great job and being successful bothers them. It's all a rather |
| bizarre environment where everyone seems to hate their jobs. I guess I've led |
| a sheltered life. |
|
|
| Before I move on, sometimes there will be certain staff members, like |
| your Case Manager, that will have a substantial amount of control over your |
| situation. The best way to deal with the person is to stay out of their way. |
| Be polite, don't file grievances against them and hope that they will take |
| care of you when it comes time. If this doesn't seem to work, then you need |
| to be a total pain in the ass and ride them with every possible request you |
| can muster. It's especially helpful if you have outside people willing to |
| make calls. Strong media attention will usually, at the very least, make the |
| prison do what they are supposed to do. If you have received a lot of bad |
| press, this could be a disadvantage. If your care continues to be a problem, |
| the prison will transfer you to another facility where you are more likely to |
| get a break. All in all how you choose to deal with staff is often a |
| difficult decision. My advice is that unless you are really getting screwed |
| over or really hate the prison you are in, don't rock the boat. |
|
|
| J. THE HOLE |
|
|
| Segregation sucks, but chances are you will find yourself there at |
| some point and usually for the most ridiculous of reasons. Sometimes you will |
| wind up there because of what someone else did. The hole is a 6' x 10' |
| concrete room with a steel bed and steel toilet. Your privileges will vary, |
| but at first you get nothing but a shower every couple of days. Naturally they |
| feed you but, it's never enough, and it's often cold. With no snacks you |
| often find yourself quite hungry in-between meals. There is nothing to do |
| there except read and hopefully some guard has been kind enough to throw you |
| some old novel. |
|
|
| Disciplinary actions will land you in the hole for typically a week or |
| two. In some cases you might get stuck there for a month or three. It depends |
| on the shot and on the Lieutenant that sent you there. Sometimes people never |
| leave the hole.... |
|
|
| K. GOOD TIME |
|
|
| You get 54 days per year off of your sentence for good behavior. If |
| anyone tells you that a bill is going to be passed to give 108 days, they are |
| lying. 54 days a year works out to 15% and you have to do something |
| significant to justify getting that taken away. The BOP has come up with the |
| most complicated and ridiculous way to calculate how much good time you have |
| earned. They have a book about three inches thick that discusses how to |
| calculate your exact release date. I studied the book intensely and came to |
| the conclusion that the only purpose it serves is to covertly steal a few days |
| of good time from you. Go figure. |
|
|
| L. HALFWAY HOUSE |
|
|
| All "eligible" inmates are to serve the last 10% of their sentence |
| (not to exceed six months) in a Community Corrections Center (CCC). At the CCC |
| , which is nothing more than a large house in a bad part of town, you are to |
| find a job in the community and spend your evenings and nights at the CCC. You |
| have to give 25% of the gross amount of your check to the CCC to pay for all of |
| your expenses, unless you are a rare Federal prisoner sentenced to serve all of |
| your time at the CCC in which case it is 10%. They will breathalyse and |
| urinanalyse you routinely to make sure you are not having too much fun. If |
| you're a good little hacker you'll get a weekend pass so you can stay out all |
| night. Most CCCs will transfer you to home confinement status after a few |
| weeks. This means you can move into your own place, (if they approve it) but |
| still have to be in for the evenings. They check up on you by phone. And no, |
| you are not allowed call forwarding, silly rabbit. |
|
|
| M. SUPERVISED RELEASE |
|
|
| Just when you think the fun is all over, after you are released from |
| prison or the CCC, you will be required to report to a Probation Officer. For |
| the next 3 to 5 years you will be on Supervised Release. The government |
| abolished parole, thereby preventing convicts from getting out of prison early. |
| Despite this they still want to keep tabs on you for awhile. |
|
|
| Supervised Release, in my opinion, is nothing more than extended |
| punishment. You are a not a free man able to travel and work as you please. |
| All of your activities will have to be presented to your Probation Officer |
| (P.O.). And probation is essentially what Supervised Release is. Your P.O. |
| can violate you for any technical violations and send you back to prison for |
| several months, or over a year. If you have ANY history of drug use you will |
| be required to submit to random (weekly) urinalyses. If you come up dirty it's |
| back to the joint. |
|
|
| As a hacker you may find that your access to work with, or possession |
| of computer equipment may be restricted. While this may sound pragmatic to |
| the public, in practice it serves no other purpose that to punish and limit a |
| former hacker's ability to support himself. With computers at libraries, copy |
| shops, schools, and virtually everywhere, it's much like restricting someone |
| who used a car to get to and from a bank robbery to not ever drive again. If a |
| hacker is predisposed to hacking he's going to be able to do it with or |
| without restrictions. In reality many hackers don't even need a computer to |
| achieve their goals. As you probably know a phone and a little social |
| engineering go a long way. |
|
|
| But with any luck you will be assigned a reasonable P.O. and you will |
| stay out of trouble. If you give your P.O. no cause to keep an eye on you, |
| you may find the reins loosening up. You may also be able to have your |
| Supervised Release terminated early by the court. After a year or so, with |
| good cause, and all of your government debts paid, it might be plausible. Hire |
| an attorney, file a motion. |
|
|
| For many convicts Supervised Release is simply too much like being in |
| prison. For those it is best to violate, go back to prison for a few months, |
| and hope the judge terminates their Supervised Release. Although the judge |
| may continue your supervision, he/she typically will not. |
|
|
|
|
| PART III |
|
|
|
|
| A. HOW TO AVOID DETECTION |
|
|
| Now that you know what kind of trouble you are facing I'll go back to |
| the beginning. If what I've just covered doesn't make you want to stop |
| hacking then you had better learn how to protect yourself. Many hackers feel |
| they have some god given constitutional right to hack. Many don't believe it |
| should be illegal. Well, neurosis and personality disorders work in strange |
| ways. Regardless, I'll cover the topic of stealth. Please note that I in no |
| way advocate or encourage hacking. This technical information is being |
| provided for educational purposes only. And as I mentioned you may feel you |
| have a perfectly legitimate reason for avoiding detection, simply trying to |
| stay clear of other hackers would be an acceptable reason. This paper (I'm |
| sure) will also serve to educate law enforcement officials on the methods |
| currently being deployed by hackers to avoid detection. |
|
|
| Avoiding being identified while hacking is in actually a rather simple |
| feat, assuming you follow a few simple rules. Unfortunately, very few |
| people bother with them, due typically to arrogance and ego. Which as I have |
| noticed, seems to be a trait that is a prerequisite to being a successful |
| hacker. I've never met a hacker who didn't think he was the shit. And when |
| it gets right down to it that was the reason that Mitnick got caught. I'll |
| examine this incident a little later. |
|
|
| So I will list here a few of the basic rules I used, and then I'll |
| expound upon them a little later. |
|
|
| * Most important of all, I would never tell another hacker who I was, |
| where I lived, or give out my home phone number. (OK, I screwed up |
| on that one.) |
|
|
| * I didn't set up network access accounts up in my real name or use |
| my real address. |
|
|
| * I didn't set up phone numbers in my real name. |
|
|
| * I would never dial directly in to anything I was hacking. |
|
|
| * I would set up some kind of notification system that would let me |
| know if someone was trying to figure out where I was connecting from. |
|
|
| * I didn't transmit personal data on systems I had have hacked into. |
|
|
| * When I used a network or computer for work or social objectives, I |
| tried to keep it separate from my hacking. |
|
|
| * I never assumed that just by connecting through a bunch of different |
| networks or using cellular phones that I was safe. Even though most |
| cellular networks do not have triangulation equipment installed they |
| still have the ability to narrow a transmitting location down to a |
| square mile of even a few blocks, this even well after you have dis- |
| connected. |
|
|
| * The minute I got into a system I would examine and edit all of the |
| logs. I would also look for email daemons on admin or admin assoc- |
| iated accts. that sent out copies of the system security logs. |
| |
| * When setting up accts. on systems I would use different login ID's. |
|
|
| * I never went to hacker cons. (Until I worked with the FBI) |
|
|
| * I would change network access dial up accts. and dial up numbers |
| every so often. I would also change living locations every 8-12 |
| months. |
|
|
| * I would keep in mind that the numbers I dialed on my phone could |
| eventually be used to track me again. For example, if I called my |
| girl friend frequently, after I changed numbers and location I might |
| still be calling that number. The telcos now have toll record data |
| base software that can cross reference and track this type of thing. |
|
|
| * I rarely used IRC until I worked with the FBI. If -you- must, change |
| your handle frequently, remain in invisible mode, and if you're leet |
| enough, spoof your IP. Remember that you should never trust other |
| hackers. Many times association with them will cause you as much |
| trouble as a run in with the Feds. |
|
|
| And yes the FBI logs all of the IRC channels and searches them for key |
| words when they are looking for information on someone or some breech. There |
| is a secret logging program running on a special irc.server that doesn't |
| accept port 6667 connections, etc. Doesn't show up as a link either. Hmm. ;-) |
|
|
| Following all of those rules would be tough. The fact of the matter |
| is if you generate enough interest and piss off the right people, they will |
| come after you. However, the FBI routinely passes over low level hackers. |
| When I worked with the Bureau I was instructed that only the most malicious |
| and aggressive hackers where to be investigated. Fine with me, wasn't my goal |
| in life to put a bunch a little hacker dorks in jail. It's not real easy to |
| catch an accomplished hacker but it can be done, it's really just a matter of |
| contacting all of the right people and putting a little time into it. |
| Typically hackers get caught because someone snitched. Thus the importance of |
| my first rule, I never told anyone who I really was. The other primary reason |
| for getting caught is arrogance or underestimating the abilities of the |
| authorities. Poulsen didn't believe an investigator would sit outside of a |
| grocery store for a week on the off chance he might show up. Poulsen had used |
| the pay phones at that store a few times, which was determined by a toll |
| record search. Mitnick didn't think someone would go through the trouble of |
| doing toll searches on cell phone records then radio frequency triangulating |
| his location. |
|
|
| Poulsen and I went through some rather elaborate anti-detection |
| procedures. Since I had physical access to my local telco Central Office I |
| would activate, connect, and wire all of my own phone services. There was |
| essentially no record of my phone number or cable and pair data. In addition, |
| I ran the wires going into my apartment through a trash chute, over the roof |
| covered by tar, and down a vent pipe into my bathroom. The connection to the |
| bridging terminal (F2) was through a hole drilled into the back of the |
| junction box. Examination of the telephone box in the basement of my building |
| revealed no connections, you would have had to take the box apart to see it. |
| And if that wasn't enough over at the C.O. I tapped on to the output channel |
| (SC1, which was the feed to SCCS) of the 1AESS telephone switch and ran it up |
| to my apartment. There I had an old PC-XT with a Bell 202 modem watching the |
| 1AESS output. Poulsen wrote a small basic program that looked for call traces |
| and any other suspicious activity. The XT would start beeping and print out |
| any of those output messages. Elaborate indeed. |
|
|
|
|
| B. THE STEALTH BOX |
|
|
|
|
| But a truly good anti-detection system would notify you absolutely if |
| someone was attempting to trace your connection. In addition, it would |
| terminate the connection before it allowed someone to see where it was going. |
| What I am suggesting is some type of dial in/dial out mechanism. For example, |
| 2 modems connected back to back, with their 232 ports connected. They would |
| then be placed in a generic wall mounted box in anonymous phone closet |
| somewhere. In addition, a stun gun would be wired to give the modems a death |
| shock if the box was opened by an unauthorized person. A password would be |
| set on the modem for dial out and the phone lines feeding the two modems would |
| have to be set up under separate accounts. This would require anyone |
| investigating, to come out and take a gander at this device to determine that, |
| it's not the location of the hacker, and that yet another call trace is in |
| order to see who is dialing in. However, having opened the box the |
| investigator has disabled the device and when you dial in you'll know that |
| something is up. Even if they attempt to replace the device, they could never |
| know the original password, or even if there was one. It would be further |
| advisable to disguise the telephone lines feeding the device, making it |
| necessary to open the box to identify them. |
|
|
| Well that's just an idea for the design of an anti-detection device. |
| It's obviously a bit complex, but you get the idea. My point being that |
| avoiding detection is not a simple task. If someone wants you they can get |
| you. There really isn't such a thing as a secure connection; virtually |
| everything can be traced, short of a highly directional data burst satellite |
| uplink. At that point the Air Force National Reconnaissance Office (NRO) or |
| the NSA would have to get involved, big bucks. |
|
|
| Aside from setting up physical hardware another idea would be to find |
| a Sysadmin that will let you use his system to connect through. If you trust |
| him to tell you if there has been an inquiry regarding your connection then |
| you might be OK. It would also be wise to set up background processes that |
| monitor finger and other related probes of your account. Watch them watch you. |
|
|
| As I mentioned earlier if you fall under surveillance there will be |
| 2-way radio traffic in your vicinity. Using the Opto-Electronics Explorer |
| will detect this and you can further investigate to see who it may be. Good |
| physical surveillance is difficult to detect. Bad physical surveillance is |
| comical. |
|
|
|
|
| C. MORE PROTECTION |
|
|
|
|
| I covered encryption earlier and as I mentioned it really is not safe |
| to assume that it will protect you from someone who takes possession of your |
| computer. The only truly safe encryption would be a military spec. |
| hardware/software implementation. When people talk about secure encryption |
| they are not taking into account that all the power of a Government might be |
| trying to crack it, and that they will have physical access to the encryption |
| device, your computer! This leaves us with one other method, destroying the |
| data. Now this in and of it's self can be construed as obstruction of |
| justice. However, should you feel the need to instantly destroy all of the |
| data on your hard drive, for oh.. lets say educational purposes. I would |
| suggest mounting a bulk magnetic tape eraser next to your hard drive. You can |
| pick one up at Radio Hack, err Shack. One flip of the panic switch, thus |
| powering up the eraser while the drive is turning, and ZAP! Mount a switch |
| next to your bed. ;-) |
|
|
| This may or may not destroy all of the data on your drive. If the |
| drive disk is removed and placed on a special reader some data may still be |
| recovered. This is a science in itself. DOD spec. requires that a hard drive |
| be written to with O's 7 times before it is considered erased. Simply erasing |
| a file, formatting, or defragging will not suffice. Look for a shareware |
| utility named "BCwipe". This will erase to military spec. You may also want |
| to install some type of program that auto erases under certain conditions. |
| Regardless, computer specialists that work with computer crime are trained to |
| look for this. |
|
|
| There are still a lot of issues that could be covered with respect to |
| avoiding detection and keeping clear of hackers. In fact I could fill a book, |
| and in retrospect I probably should have. But I told a lot of people I would |
| write this file and make it public. Hope you found it of some assistance. |
| |
|
|
| CLOSURE |
|
|
| What a long strange trip it's been. I have a great deal of mixed |
| emotions about my whole ordeal. I can however, say that I HAVE benefited |
| from my incarceration. However, it certainly was not on the behalf of how I |
| was handled by the government. No, despite their efforts to kick me when I |
| was down, use me, turn their backs after I had assisted them, and in general, |
| just violate my rights, I was still able to emerge better educated than when I |
| went in. But frankly, my release from prison was just in the nick of time. |
| The long term effects of incarceration and stress were creeping up on me, and |
| I could see prison conditions were worsening. It's hard to express the |
| poignancy of the situation but the majority of those incarcerated feel that if |
| drastic changes are not made America is due for some serious turmoil, perhaps |
| even a civil war. Yes, the criminal justice system is that screwed up. The |
| Nation's thirst for vengeance on criminals is leading us into a vicious |
| feedback loop of crime and punishment, and once again crime. Quite simply, |
| the system is not working. My purpose in writing this article was not to send |
| any kind of message. I'm not telling you how not to get caught and I'm not |
| telling you to stop hacking. I wrote this simply because I feel like I owe it |
| to whomever might get use of it. For some strange reason I am oddly compelled |
| to tell you what happened to me. Perhaps this is some kind or therapy, |
| perhaps it's just my ego, perhaps I just want to help some poor 18 year old |
| hacker who really doesn't know what he is getting himself in to. Whatever the |
| reason, I just sat down one day and started writing. |
|
|
| If there is a central theme to this article it would be how ugly your |
| world can become. Once you get grabbed by the law, sucked into their vacuum, |
| and they shine the spotlight on you, there will be little you can do to |
| protect yourself. The vultures and predators will try to pick what they can |
| off of you. It's open season for the U.S. Attorneys, your attorney, other |
| inmates, and prison officials. You become fair game. Defending yourself from |
| all of these forces will require all of your wits, all of your resources, and |
| occasionally your fists. |
|
|
| Furthering the humiliation, the press, as a general rule, will not be |
| concerned with presenting the truth. They will print what suits them and |
| often omit many relevant facts. If you have read any of the 5 books I am |
| covered in you will no doubt have a rather jaded opinion of me. Let me assure |
| you that if you met me today you would quickly see that I am quite likable and |
| not the villain many (especially Jon Littman) have made me out to be. You may |
| not agree with how I lived my life, but you wouldn't have any trouble |
| understanding why I chose to live it that way. Granted I've made my mistakes, |
| growing up has been a long road for me. Nevertheless, I have no shortage of |
| good friends. Friends that I am immensely loyal to. But if you believe |
| everything you read you'd have the impression that Mitnick is a vindictive |
| loser, Poulsen a furtive stalker, and I a two faced rat. All of those |
| assessments would be incorrect. |
|
|
| So much for first impressions. I just hope I was able to enlighten |
| you and in some way to help you make the right choice. Whether it's |
| protecting yourself from what could be a traumatic life altering experience, |
| or compelling you to focus your computer skills on other avenues, it's |
| important for you to know the program, the language, and the rules. |
|
|
| See you in the movies. |
|
|
| Agent Steal |
| 1997 |
|
|
| ----[ EOF |
|
|
|
|