| ---[ Phrack Magazine Volume 8, Issue 53 July 8, 1998, article 14 of 15 |
|
|
|
|
| -------------------------[ P H R A C K W O R L D N E W S |
|
|
|
|
| --------[ Issue 53 |
|
|
| Hi. A few changes have been made to Phrack World News (PWN). Because of |
| the increase of news on the net, security, hackers and other PWN topics, |
| it is getting more difficult to keep Phrack readers informed of everything. |
| To combat this problem, PWN will include more articles, but only relevant |
| portions (or the parts I want to make smart ass remarks about). If you would |
| like to read the full article, look through the ISN (InfoSec News) archives |
| located at: |
|
|
| ftp.sekurity.org /pub/text/isn |
| ftp.repsec.com /pub/text/digests/isn |
|
|
| The following articles have been accumulated from a wide variety of places. |
| When known, original source/author/date has been included. If the information |
| is absent, then it wasn't sent to us. If you wish to receive more news, the |
| ISN mail list caters to this. For more information, mail |
| majordomo@sekurity.org with "info isn". To subscribe, mail |
| majordomo@sekurity.org with "subscribe isn" in the body of the mail. |
|
|
| As usual, I am putting some of my own comments in brackets to help readers |
| realize a few things left out of the articles. Comments are my own, and |
| do not necessarily represent the views of Phrack, journalists, government |
| spooks, my cat, or anyone else. Bye. |
|
|
| - disorder |
|
|
|
|
| 0x1: Identifying Net Criminals Difficult |
| 0x2: "The Eight" meet to combat high-tech crime |
| 0x3: Fired Forbes Technician Charged With Sabotage |
| 0x4: Internet Industry Asked to Police Itself |
| 0x5: Internet may be Hackers Best Friend |
| 0x6: Hacker Cripples Airport Tower |
| 0x7: Profits Embolden Hackers |
| 0x8: Cyberattacks spur new warning system |
| 0x9: <pure lameness> |
| 0xa: IBM's Ethical Hackers Broke In! |
| 0xb: Two accused of conspiring to hack into CWRU system |
| 0xc: FBI Warns of Big Increase In On-line Crime |
| 0xd: Computer hacker jailed for 18 months |
| 0xe: Afternoon Line |
| 0xf: Hacking Geniuses or Monkeys |
| 0x10: Low Tech Spooks - Corporate Spies |
| 0x11: 'White Hat' Hackers Probe Pores in Computer Security Blankets |
| 0x12: 101 Ways to Hack into Windows NT |
| 0x13: Suspected NASA Hacker Nabbed |
| 0x14: CEOs Hear the Unpleasant Truth about Computer Security |
| 0x15: Codebreakers |
| 0x16: Hackers Could Disable Military |
| 0x17: Secret Service Hackers Can't Crack Internet |
| 0x18: Now Hiring: Hackers (Tattoos Welcome) |
| 0x19: Hacker Stoppers? |
| 0x1a: Hackers' Dark Side Gets Even Darker |
| 0x1b: Japan Fears It's Becoming a Base for Hackers |
| 0x1c: Kevin Mitnick Hacker Case Drags On and On |
| 0x1d: Millions Lost to Phone Hackers |
| 0x1e: Hackers on the Hill |
| 0x1f: RSA Sues Network Associates |
| 0x20: Clinton to Outline Cyberthreat Policy |
| 0x21: Programmer Sentenced for Military Computer Intrusion |
| 0x22: Editorial - Hacker vs Cracker, Revisited |
| 0x23: Windows NT Security Under Fire |
| 0x24: New Decoy Technology Designed to Sting Hackers |
| 0x25: Reno dedicates high-tech crime fighting center |
| 0x26: Man poses as astronaut steals NASA secrets |
|
|
| 0x27: Convention: Defcon 6.0 |
| 0x28: Convention: Network Security Solutions July Event |
| 0x29: Convention: 8th USENIX Security Symposium |
| 0x2a: Convention: RAID 98 |
| 0x2b: Convention: Computer Security Area (ASC) / DGSCA 98 |
| 0x2c: Convention: InfoWarCon-9 |
|
|
|
|
| 0x1>------------------------------------------------------------------------- |
|
|
| Title: Identifying Net Criminals Difficult |
| Source: 7Pillars Partners |
| Author: David Plotnikoff (Mercury News Staff Writer) |
| Date: 10:12 p.m. PST Sunday, March 8, 1998 |
|
|
| [snip...] |
|
|
| What began as an innocent chat-room flirtation isn't so innocent anymore. |
| The last e-mail message you received began: ``I know where you live. I |
| know where you work. I know where your kids go to day care. . . .'' |
| Potential loss: Your life. |
|
|
| There is no way to calculate how many hundreds or thousands of times each |
| day the Net brings crime into some unsuspecting person's life. But a |
| report released by the Computer Security Institute found that nearly |
| two-thirds of the 520 corporations, government offices, financial |
| institutions and universities queried had experienced electronic break-ins |
| or other security breaches in the past 12 months. |
|
|
| Although fewer than half the companies assigned a dollar amount to their |
| losses, the estimated total from those that did is staggering: $236 |
| million for the last two years. |
|
|
| [More estimates on losses, no doubt from accurate estimations |
| by professionals.] |
|
|
| [snip...] |
|
|
| But those charged with enforcing the law in cyberspace say the vast |
| majority of Net-borne crime never reaches the criminal justice system. And |
| in the relatively few instances where a crime is reported, most often the |
| criminal's true identity is never found. |
|
|
| The San Jose Police Department's elite high-tech crimes unit is every |
| citizen's first line of defense when trouble comes down the wire in the |
| capital city of Silicon Valley. But today, four years after the explosion |
| of the Internet as a mass market, even the top technology-crimes police |
| unit in the country finds itself with just a handful of Internet crimes to |
| investigate. |
|
|
| [Wait... they say criminals get away with everything, then call the |
| Police an "elite" high-tech crimes unit?] |
|
|
| [snip...] |
|
|
| The Internet slice of the job -- chasing down hackers, stalkers and |
| assorted scammers -- is too small to even keep statistics on. When pressed |
| for a guess, Sgt. Don Brister, the unit's supervisor, estimates that |
| Internet and online-service crimes make up ``probably no more than 3 or 4 |
| percent'' of the team's workload. |
|
|
| [snip...] |
|
|
| While most Net crimes are actually old crimes -- stalking, harassment, |
| fraud and theft -- in a new venue, there is at least one criminal act |
| entirely native to cyberia: ``denial of service'' attacks. |
|
|
| [Route, you're such a criminal.] |
|
|
| [snip...] |
|
|
| ``The scary part,'' Lowry says, ``is we know the storm is coming, but we |
| don't know exactly what shape it's going to take. The scale is huge. . . . |
| You're sitting on this beach, knowing it's going to hit, but you don't |
| know what it is or when it's going to hit.'' |
|
|
| 0x2>------------------------------------------------------------------------- |
|
|
| Title: "The Eight" meet to combat high-tech crime |
| Date: Jan 1998 |
|
|
| Recently, U.S. Attorney General Janet Reno hosted a historic meeting of |
| Justice and Interior officials from the countries that constitute "the |
| Eight" on ways to combat international computer crime. (Formerly dubbed |
| the G-7, the group now includes Russia along with the United Kingdom, |
| France, Germany, Italy, Canada, Japan, and the U.S.) |
| |
| The meeting was the first of its kind and resulted in an agreement |
| endorsing ten principles, such as "Investigation and prosecution of |
| international high-tech crimes must be coordinated among all concerned |
| states, regardless of where harm has occurred;" and adopting a ten-point |
| action plan, for example, "Use our established network of knowledgeable |
| personnel to ensure a timely, effective response to transnational |
| high-tech cases and designate a point-of-contract who is available on a 24 |
| hour basis." |
| |
| The full text will be available at http://www.usdoj.gov. |
|
|
| 0x3>------------------------------------------------------------------------- |
|
|
| Title: Fired Forbes Technician Charged With Sabotage |
| Source: Dow Jones News Service |
| Date: 11/25/97 |
|
|
|
|
| A temporary staff computer technician has been charged with breaking into |
| the computer system of Forbes, Inc., publisher of Forbes magazine, and |
| causing a computer crash that cost the company more than $100,000. |
|
|
| According to the complaint against George Mario Parente, the sabotage |
| left hundreds of Forbes employees unable to perform server-related |
| functions for a full day and caused many employees to lose a day's worth |
| of data. If convicted, Parente faces up to five years in prison and a |
| maximum fine of $250,000. |
|
|
|
|
| 0x4>------------------------------------------------------------------------- |
|
|
| Title: Internet Industry Asked to Police Itself |
|
|
|
|
| SEATTLE -- The Internet industry had better police itself or it will face |
| renewed threats of government regulation, participants said Wednesday at a |
| Seattle conference of technology leaders from throughout North America as |
| well as Europe and Japan. |
|
|
| [And they've done such a good job so far, with legislation like the CDA |
| and WIPO... sure, we can trust the government to do the right thing.] |
|
|
| [snip...] |
|
|
| Balkam warned that Arizona Sen. John McCain plans hearings next month on |
| the topic, and that Indiana Sen. Dan Coats plans to introduce a new |
| content-regulation bill designed to avoid the problems that caused the |
| Supreme Court to reject the first one. |
|
|
| [Everyone keep your eyes peeled.] |
|
|
| Wednesday's discussion was well-timed; the conference will hear Thursday |
| from President Clinton's Internet czar, Ira Magaziner, who is expected to |
| deliver a stern admonition that government won't hesitate to step in if |
| the industry's own efforts fall short. |
|
|
| Sponsored by GTE, Telus Corp. and the Discovery Institute, the program |
| also included Rep. Rick White, R-Washington, founder of the Congressional |
| Internet Caucus and Rob Glaser, founder of Seattle-based RealNetworks and |
| a proponent of the Internet as the ``next mass medium.'' |
|
|
| While Wednesday's sessions focused on content regulation, Thursday's deal |
| more with electronic commerce and such issues as privacy, authentication |
| and legal jurisdiction. |
|
|
| Effective self-regulation has several keys, said Jim Miller, architect of |
| a system known as PICS, the Platform for Internet Content Selection. |
|
|
| [snip...] |
|
|
| 0x5>------------------------------------------------------------------------- |
|
|
| Title: Internet may be Hackers Best Friend |
|
|
| The Internet may be the computer hacker's best friend. The international |
| computer network has made the sharing of sophisticated break-in tools |
| easier, computer security experts say. |
|
|
| [But they don't mention the sharing of security information, or the fact |
| that the experts can subscribe to the same 'hacker' sharing sources.] |
|
|
| [snip...] |
|
|
| A report released Wednesday by the Computer Security Institute noted that |
| while both external and internal computer crime is on the rise, the |
| greatest losses result from unauthorized access by insiders. |
|
|
| ``Those are the attacks that cause tens of millions of dollars,'' Power |
| said. |
|
|
| But it's still the outside jobs that grab headlines. A Defense Department |
| official last week termed the attack linked to the young hackers ``the |
| most organized and systematic attack the Pentagon has seen to date.'' |
|
|
| [snip...] |
|
|
| 0x6>------------------------------------------------------------------------- |
|
|
| Title: Hacker Cripples Airport Tower |
|
|
| A juvenile hacker who crippled an airport tower for six hours, damaged a |
| town's phone system, and broke into pharmacy records has been charged in a |
| first-ever federal prosecution, the U.S. Attorney's office announced |
| today. |
|
|
| But in a plea bargain, the juvenile will serve no jail time, the |
| government announced. |
|
|
| The incidents occurred in early 1997, but the federal criminal charges |
| were unsealed just today. The government said it was the first federal |
| prosecution ever of a minor for a computer crime. |
|
|
| According to U.S. Attorney Donald K. Stern, the hacker disabled a key |
| telephone company computer servicing the Worcester airport, roughly 45 |
| miles southwest of Boston. |
|
|
| "As a result of a series of commands sent from the hacker's personal |
| computer, vital services to the FAA control tower were disabled for six |
| hours in March of 1997," a release from Stern's office said. |
|
|
| [So the FAA routes vital tower control through the PSTN? Scary...] |
|
|
| [snip...] |
|
|
| The plea agreement sentences the juvenile to two years' probation, "during |
| which he may not possess or use a modem or other means of remotely |
| accessing a computer or computer network directly or indirectly," |
| according to Stern |
|
|
| In addition, he must pay restitution to the telephone company and complete |
| 250 hours of community service. He has been required to forfeit all of the |
| computer equipment used during his criminal activity. |
|
|
| [snip...] |
|
|
| "Public health and safety were threatened by the outage, which resulted in |
| the loss of telephone service, until approximately 3:30 p.m., to the |
| Federal Aviation Administration Tower at the Worcester Airport, to the |
| Worcester Airport Fire Department, and to other related concerns such as |
| airport security, the weather service, and various private air freight |
| companies. |
|
|
| "Further, as a result of the outage, both the main radio transmitter, |
| which is connected to the tower by the loop carrier system, and a circuit, |
| which enables aircraft to send an electric signal to activate the runway |
| lights on approach, were not operational for this same period of time." |
|
|
| [NICE design guys... real nice.] |
|
|
| [snip...] |
|
|
| 0x7>------------------------------------------------------------------------- |
|
|
| Title: Profits Embolden Hackers |
| Source: InternetWeek |
| Author: Tim Wilson |
|
|
| Conventional wisdom says that most IT security threats come from inside |
| the company, not outside. Any guess who's reaping the greatest benefit |
| from that little piece of wisdom? |
|
|
| Hackers and computer criminals. |
|
|
| In two separate studies completed this month, Fortune 1000 companies |
| reported more financial losses due to computer vandalism and espionage in |
| 1997 than they ever experienced before. Several corporations said they |
| lost $10 million or more in a single break-in. And reports of system |
| break-ins at the Computer Emergency Response Team site are the highest |
| they've ever been. |
|
|
| Despite recent security product and technology developments, computer |
| networks are becoming more vulnerable to outside attack, not less. |
|
|
| [Woohoo!] |
|
|
| [snip...] |
|
|
| "I know about 95 percent of [the vulnerabilities] I am going to find at a |
| company before I even get there," said Ira Winkler, president of the |
| Information Security Advisory Group -- a firm that specializes in |
| penetrating business security systems to expose vulnerabilities -- and |
| author of the book Corporate Espionage. "I can steal a billion dollars |
| from any [corporation] within a couple of hours." |
|
|
| [One trick pony...] |
|
|
| [snip...] |
|
|
| In a study to be published next month, WarRoom Research found that the |
| vast majority of Fortune 1000 companies have experienced a successful |
| break-in by an outsider in the past year. More than half of those |
| companies have experienced more than 30 system penetrations in the past 12 |
| months. Nearly 60 percent said they lost $200,000 or more as a result of |
| each intrusion. |
|
|
| In a separate study published earlier this month by the Computer Security |
| Institute and the FBI, 520 U.S. companies reported a total loss of $136 |
| million from computer crime and security breaches in 1997, an increase of |
| 36 percent from the year before. The Internet was cited by 54 percent of |
| the respondents as a frequent point of attack, about the same percentage |
| of respondents that cited internal systems as a frequent point of attack. |
|
|
| [snip...] |
|
|
| What You Can Do |
|
|
| One universal piece of advice came from hackers, hackers for hire and |
| those who collect computer crime data: When your vendor issues a software |
| patch, install it immediately. |
|
|
| "The biggest mistake people make is that they underestimate the threat," |
| Moss said. "They don't put in the patches, they misconfigure their |
| firewalls, they misconfigure routers." |
|
|
| [snip...] |
|
|
| 0x8>------------------------------------------------------------------------- |
|
|
| Title: Cyberattacks spur new warning system |
| Author: Heather Harreld |
| Date: March 23, 1998 |
|
|
| The Defense Department has created a new alert system to rate the level of |
| threats to its information systems that mirrors the well-known Defense |
| Conditions (DEFCONs) ratings that mark the overall military status in |
| response to traditional foreign threats. |
|
|
| The new Information Conditions, or "INFOCONs," are raised and lowered |
| based upon cyberthreats to DOD or to the U.S. Strategic Command (Stratcom) |
| at Offutt Air Force Base in Nebraska. Stratcom is responsible for |
| deterring any military attack on the United States and for deploying |
| troops or launching nuclear weapons should deterrence fail, a Stratcom |
| spokesman said. As INFOCONs are raised, officials take additional measures |
| to protect information systems. |
|
|
| [snip...] |
|
|
| Officials at Stratcom have developed detailed guidelines on raising and |
| lowering INFOCONs based on the threat. Structured, systematic attacks to |
| penetrate systems will result in a higher INFOCON level than when |
| individual, isolated attempts are made, according to Stratcom. |
|
|
| [snip...] |
|
|
| 0x9>------------------------------------------------------------------------- |
|
|
| Title: <pure lameness> |
| Source: "Betty G.O'Hearn" <betty@infowar.com> |
|
|
| Infowar.Com was notified today by the "Enforcers" Computer Hackers Group, |
| that an agreement was reached with chief negotiator Ian A. Murphy, aka |
| Capt. Zap, to cease and desist their cyber destruction witnessed in the |
| recent attacks and intrusions that have rocked the Internet in past weeks. |
| The Enforcers began their massive assault on corporate and military |
| websites after the arrest of "Pentagon Hackers" here in the US and Israel. |
|
|
| Ian Murphy, CEO of IAM/Secure Data Systems, and the first US hacker |
| arrested back in 1981, issued press releases during negotiations. (see |
| www.prnewswire.com) Murphy began the process to begin deliberations out of |
| a sense of duty. Murphy's dialogue with members of the Enforcer group |
| pointed to the fact that the destruction was counter productive. He urged |
| the group to consider halting this activity. "The destruction of |
| information systems for an alleged cause is not the way to go about such |
| things in defense of Hackers and Crackers." |
|
|
| [Who made Ian Murphy chief negotiator? Why wasn't I notified so I |
| could talk to these wankers? This is the kind of pathetic shit |
| that makes PRNewswire the pond scum of journalism. In case you couldn't |
| tell, this is pure media hype designed to get more business for |
| Murphy and CO.] |
|
|
| [snip...] |
|
|
|
|
| Statement from a Enforcers representative is below. |
|
|
| [HTML tags have been removed.] |
|
|
| From: Adam <<adamb1@flash.net> |
| Reply-To: adamb1@flash.net |
| Date: March 26, 1998 |
| Organization: Adam's Asylum |
| To: "Betty G.O'Hearn" <<betty@infowar.com> |
| Subject: Enforcers Press Release/Announcement |
|
|
| STATEMENT OF THE ENFORCERS |
|
|
| We, the Enforcers, have decided that it would be in the best interest of |
| the hacking community and the security community at large to cease and |
| desist all web site hacking of external businesses as advised by Mr. Ian |
| Murphy (Captain Zap.) We agree that our actions are not productive and are |
| doing more harm than good towards the security community. |
|
|
| Therefore, as an agent of the Enforcers, I hereby state that all web site |
| hacks on external sites will be immediately halted. We feel that there |
| will be other avenues opening to achieve our goal of a substantial |
| reduction in child pornography and racist web sites and netizens. We also |
| support the larger goals of the hacker community and in the future we will |
| work to augment the public's view rather than detract from it. All members |
| of Enforcers who hacked the web sites have agreed to this release and will |
| stop hacking external web sites. |
|
|
| [13:51 GMT -0600 26 March 1998] |
|
|
| We thank you for your time and assistance in this matter. |
|
|
| We congratulate both Mr. Murphy and The Enforcers for their diligence in |
| reaching this agreement. This is indeed an act of peace in our cyberworld. |
|
|
| [This is indeed an act which causes illness to stomach.] |
|
|
| 0xa>------------------------------------------------------------------------- |
|
|
| Title: IBM's Ethical Hackers Broke In! |
|
|
| TUCSON, Ariz. (March 23, 1998 8:30 p.m.) - International Business Machines |
| Corp.'s team of "ethical hackers" successfully broke into an unnamed |
| company's computer network in a demonstration of a live attack at a |
| computer industry conference. |
|
|
| [They make it sound like this is a big event. "Look guys! We |
| actually broke in!#$!"] |
|
|
| [snip...] |
|
|
| Palmer said IBM charges between $15,000 to $45,000 to perform a hack of a |
| company's system, with its permission, to test its security. Palmer said |
| because hacking is a felony, its clients sign a contract that he calls a |
| "get out of jail free card" specifying what IBM is allowed to do. |
|
|
| The IBM team, which has an 80 percent success rate in electronic |
| break-ins, is not a team of reformed hackers and Palmer warned the |
| audience that hiring former hackers can be very dangerous, and not worth |
| the risk. |
|
|
| [*BULLSHIT* .. IBM hires hackers.. IBM hires hackers.. secret is out, |
| nyah nyah.] |
|
|
| [snip...] |
|
|
| He said that there are currently about 100,000 hackers worldwide, but that |
| about 9.99 percent of those hackers are potential professional hired |
| hackers, who may be involved in corporate espionage, and .01 percent are |
| world class cyber criminals. Ninety percent are amateurs who "cyber" |
| joyride." |
|
|
| [snip...] |
|
|
| 0xb>------------------------------------------------------------------------- |
|
|
| Title: Two accused of conspiring to hack into CWRU system |
| Source: Plain Dealer Reporter |
| Author: Mark Rollenhagen |
| Date: Thursday, March 26, 1998 |
| |
| A federal grand jury yesterday indicted two Cleveland Heights residents on |
| felony computer hacking charges. |
| |
| Rebecca L. Ching, 27, and Jason E. Demelo, 22, who authorities said live |
| in an apartment on Mayfield Rd., are accused of conspiring to hack into |
| the computer system at Case Western Reserve University between October |
| 1995 and June 1997. |
| |
| Ching was a systems administrator for a computer system on the CWRU campus |
| network during at least a portion of the conspiracy, the indictment said. |
| |
| She is accused of helping Demelo hack into the CWRU system by directing |
| him to install a "sniffer" program capable of intercepting electronic |
| information, including user names and passwords. |
| |
| Federal prosecutors would not say why Ching and Demelo allegedly sought |
| to hack into the system. |
| |
| Neither could be reached to comment. |
| |
| Tom Shrout, director of communications for CWRU, said Ching worked part |
| time for the university in its information sciences division three or four |
| years ago. |
| |
| The case is believed to be the first federal computer hacking case brought |
| in Northern Ohio since the FBI organized a computer crime unit last year. |
| |
| Demelo is also charged with seven counts of illegally intercepting |
| electronic communications sent to other universities, including Cleveland |
| State University, George Mason University and the University of Minnesota, |
| and Internet providers, including Modern Exploration, APK Net Ltd., and |
| New Age Consulting Service, and Cyber Access, a software company. |
| |
| 0xc>------------------------------------------------------------------------- |
|
|
| Title: FBI Warns of Big Increase In On-line Crime |
|
|
| [Hrm.. wonder if it is time to get next year's budget?!] |
|
|
| WASHINGTON (March 25, 1998 00:19 a.m. EST) -- Criminal cases against |
| computer hackers have more than doubled this year as the ranks of teenage |
| hackers were joined by industrial spies and foreign agents, the FBI warned |
| Tuesday. |
|
|
| [Cases have doubled... no word on convictions.. hrm...] |
|
|
| The FBI told a congressional Joint Economic Committee hearing that it had |
| recorded a significant increase in its pending cases of computer |
| intrusions, rising from 206 to 480 this year. |
|
|
| [snip...] |
|
|
| Michael Vatis, head of the FBI's national infrastructure protection |
| center, said: "Although we have not experienced the electronic equivalent |
| of a Pearl Harbor or Oklahoma City, as some have foretold, the statistics |
| and our cases demonstrate our dangerous vulnerabilities to cyber attacks." |
|
|
| [snip...] |
|
|
| He told how one hacker had broken into telephone systems in Massachusetts |
| to cut off communications at a regional airport and disconnect the control |
| tower last year. Last week a teenager agreed to serve two years' probation |
| after pleading guilty to disrupting communications at the Worcester, |
| Mass., airport for six hours. |
|
|
| Another hacker in Florida is accused of breaking into the 911 emergency |
| phone system last year and jamming all emergency services calls in the |
| region. |
|
|
| The FBI said the dangers of cybercrime were rising because of the |
| increased availability of hacking tools on the Internet, as well as |
| electronic hardware such as radio frequency jamming equipment. |
|
|
| Last week Deputy Defense Secretary John Hamre toured European governments |
| to warn of the risks of computer crime and discuss possible |
| counter-measures. |
|
|
| In spite of the publicity surrounding hackers, industrial espionage |
| remains the most costly source of cybercrime, the committee heard Tuesday. |
|
|
| Last July an unnamed computer communications company sent a malicious |
| computer code which diverted communications from one of its rivals. The |
| FBI estimated the victim company suffered losses of more than $1.5 |
| million. |
|
|
| Other FBI officials told how the U.S. was increasingly the subject of |
| economic attack by foreign governments using computers. Larry Torrence, of |
| the FBI's national security division, said foreign agents were |
| "aggressively targeting" proprietary business information belonging to |
| U.S. companies. |
|
|
| More frequently, criminals are using the Internet to defraud potential |
| investors with bogus investment schemes and banks. |
|
|
| Fraudulent schemes on the Internet were becoming "epidemic," said Neil |
| Gallagher, of the FBI's criminal division. One pyramid scheme, called |
| Netware International, had recruited 2,500 members across the country by |
| promising to share profits of 25 percent a year in a new bank which it was |
| claiming to form. |
|
|
| Investigators said they had seized almost $1 million to date. |
|
|
| 0xd>------------------------------------------------------------------------- |
|
|
| Title: Computer hacker jailed for 18 months |
| Date: Friday, March 27, 1998 |
| |
| A computer hacker who tried to destroy an Internet company that refused to |
| hire him was jailed for 18 months today for offences that include |
| publishing customer credit card numbers. |
| |
| In the NSW District Court, Judge Cecily Backhouse said Skeeve Stevens |
| seriously damaged AUSnet, which has since gone out of business, by |
| compromising 1,225 credit cards and by prominently displaying a message on |
| its homepage on the World Wide Web. |
| |
| The April 1995 message included: "So dont (sic) be surprised if all you |
| (sic) cards have millions of dollars of shit on them ... AUSNET is a |
| disgusting network ... and should be shut down and sued by all their |
| users!" |
| |
| Stevens, 26, pleaded guilty to inserting data into a computer system in |
| Sydney in April 1995 and asked the judge to take into account another |
| eight offences, including accessing confidential information. |
|
|
| [snip...] |
|
|
| The judge said Stevens' actions caused serious harm to the goodwill of |
| AUSnet, whose staff had to answer non-stop calls from angry customers - |
| many of whom cancelled their accounts - and who had to deal with crippling |
| effects of their cash flows. |
| |
| Judge Backhouse said general deterrence was important in this type of |
| offence, which was very hard to detect. |
| |
| She jailed him for three years, but ordered him to be released on a |
| recognisance after 18 months. - Australian Associated Press *Australian |
| Eastern Daylight Time (AEDT) is 11 hours ahead of Greenwich Mean Time. |
| |
| 0xe>------------------------------------------------------------------------- |
|
|
| Title: Afternoon Line |
| Source: The Netly News |
| Author: Declan McCullah |
| Date: March 24, 1998 |
|
|
| Technology is one of those issues where lawmakers vie to sound as dumb as |
| possible. At a "cyber-theft" hearing this morning, Rep. Jim Saxton |
| (R-N.J.) said that his only knowledge about computers dates back to when |
| his printer had a cover "to shield our ears from the noise." Could the |
| witnesses from the FBI please explain the problems they had with this |
| newfangled Internet? Sure, replied Michael Vatis, the head of the National |
| Infrastructure Protection Center: "There are hacker web sites" out there, |
| he said, with software that lets you "click on a button to launch an |
| attack." The fact that Carnegie Mellon University's CERT center reported a |
| 20 percent reduction in attacks from 1996 to 1997 didn't faze him. The |
| real problem, Vatis griped, is "people out there who still romanticize |
| hackers as kids just having fun. [What about] the elderly person who can't |
| get through to 911 in an emergency because of a hacker?" Joining Vatis in |
| testifying before Congress' Joint Economic Committee were top FBI honchos |
| Larry Torrence and Neil Gallagher. Nobody representing civil liberties |
| groups, computer security organizations, or high tech companies was |
| invited to speak. --By Declan McCullagh/Washington |
|
|
| [...] |
|
|
| Witness at the Persecution |
|
|
| Then again, there's a job opportunity in Los Angeles for someone with |
| top-notch skills in telecommunications, system and network administration, |
| and computer security -- and you won't even have to turn on a computer. |
| The lawyer for renown hacker Kevin Mitnick is looking for an expert |
| witness to testify at his client's trial, and has issued a sort of want-ad |
| press release. "Qualified candidates must have an advanced degree and be |
| knowledgeable in DOS, Windows, SunOS, VAX/VMS and Internet operations," |
| the job description reads. Oh well, they lost me after "qualified," but |
| with Uncle Sam paying the tab it could be the perfect opportunity for |
| someone with a taste for the spotlight and nothing on their agenda |
| starting as early as March 30. |
|
|
|
|
| 0xf>------------------------------------------------------------------------- |
|
|
| Title: Hacking Geniuses or Monkeys |
| Source: ZDTV |
| Author: Ira Winkler |
| Date: March 30, 1998 |
|
|
| By now everyone has heard about the Pentagon hacks-- and the ensuing |
| arrests of two teenagers in Cloverdale, Calif., and The Analyzer, the |
| Israeli claiming to be the superhacking mentor of the Cloverdale teens. |
| There were also two other Israelis arrested at the same time. |
|
|
| The media and Websites like antionline.com portrayed the criminals as |
| geniuses. I never heard of these supposed geniuses before, but the one |
| thing that went through my mind was a quote by Scott Charney, Chief of the |
| Department of Justice Computer Crime and Intellectual Property Unit: "Only |
| the bad ones get caught." |
| |
| I wanted the inside scoop, so I talked to some real hackers, who are |
| really considered "elite" within the hacking community. These are people |
| who have been hacking for over a decade and can take control of any system |
| that they want. They invent the hacks that the wannabes find tools to |
| accomplish. |
|
|
| The opinion of the elite varied little: "The hackers involved in the |
| Pentagon and ensuing hacks are clueless." |
|
|
| Bad hackers are clueless |
|
|
| Why are the Pentagon hackers clueless? In the first place, they were |
| caught. |
|
|
| The inside scoop is that the Pentagon hackers did nothing to cover their |
| tracks and used the same routes of access again and again, making their |
| capture inevitable. In short, they failed the basics of Criminal Hacking |
| 101. |
|
|
| The true act of stupidity, however, was talking to the press and being |
| totally unrepentant about their actions. They even bragged about it. This |
| is like asking the FBI, "Please prosecute me." |
|
|
| While the Department of Justice doesn't usually prosecute juveniles, the |
| teenagers were almost daring them to. Then The Analyzer jumped in, |
| threatening to wreak havoc on the entire Internet if the teenagers were |
| pursued. A week later he was arrested. |
|
|
| Skilled hackers remember the arrest of the people who hacked the DoJ and |
| CIA webpages. The lesson: if you leave any tracks while embarrassing the |
| US Government, you will be caught. |
|
|
| The hacking inner circle told me that The Analyzer did not cover his |
| tracks at all, and his capture was easy, even though it spanned |
| international lines. And how skillful are The Analyzer and the Pentagon |
| hackers? According to my sources, almost all the hacks were accomplished |
| via a tool that automatically exploited the rstatd problem. |
|
|
| You really don't have to know what the rstatd problem means. The best |
| analogy is that the Pentagon hackers found a master key on the street and |
| tried it on every lock that they could find. Unfortunately, there are tens |
| of thousands of "locks" that the master key fits. This is hardly the sign |
| of a computer genius, according to the elite. |
|
|
| Who is The Analyzer, anyway? |
|
|
| The real hackers then wondered why they have never heard of The Analyzer |
| before. The talented hackers do seem to know each other or at least hear |
| about the "rising stars" of the community. The Analyzer never fit this |
| category. Nor did anyone recognize him when his picture was wired around |
| the world. |
|
|
| And what about the language that the Pentagon hackers and The Analyzer |
| used in their unwise interviews? |
|
|
| The Analyzer threatened to damage "Internet servers." Apparently, real |
| hackers don't use this term, it is too mainstream. The California |
| teenagers were quoted as saying that the reason they hacked was, "Power." |
| Among the elite, real power is the anonymous and undetected control of a |
| computer. Needless to say, the Pentagon hackers were not anonymous or |
| undetected. I wonder how "powerful" they will feel in prison. |
|
|
| It didn't surprise my hacker friends when another group of hackers, |
| calling themselves The Enforcers, jumped on the bandwagon. These people |
| threatened to hack computers all over the world in retaliation for the |
| capture of The Analyzer and the Cloverdale teens. Of course, The |
| Enforcers' self-proclaimed leader used the same email address to put out |
| his statements and respond to queries from the media-- making himself and |
| his group easy targets for federal attention. |
|
|
| The only reasons he may not be arrested is that his group hasn't caused |
| any real damage, and the FBI has more important problems to deal with than |
| wannabe hackers looking for their 15 minutes of fame. |
|
|
| Hacker wannabes |
|
|
| I'm really getting sick of the Pentagon hacking stories, and all the |
| wannabe hackers clamoring for their moment in the spotlight. Perhaps, when |
| the FBI starts actively prosecuting juveniles and other people for |
| hacking-related crimes, these wannabes will start using their computers in |
| more productive ways. |
|
|
| More importantly, maybe the media will stop portraying anyone who can hack |
| a computer as some sort of genius. As I have said before, and as the real |
| hackers can confirm, I can train a monkey to break into a computer in a |
| few hours. The Pentagon hackers have displayed no more talents than the |
| monkeys of which I speak. On the other hand, the fact that they can break |
| into Pentagon computers makes the Department of Defense look like monkeys |
| as well. |
|
|
| The fact that the media continues to paint these wannabes as geniuses |
| makes them worse than monkeys. |
|
|
| 0x10>------------------------------------------------------------------------- |
|
|
| Title: Low Tech Spooks - Corporate Spies |
| Source: Forbes |
| Author: Adam L. Penenberg |
|
|
| In his slightly crumpled brown uniform, Richard Jones looked like any |
| typical deliveryman, bringing in a new batch of urgently needed office |
| supplies to corporations everywhere. But Jones, who was heading for the |
| parking lot of a major chipmaker's border town maquiladora, only looked |
| the part. Everything about him that day was made up. |
|
|
| His uniform, "A close match, but not perfect," he would recall later, the |
| office supplies--paper, pens and toner cartridges--picked up from a local |
| stationery store. Even his name was fictional. |
|
|
| As Jones took a final deep breath and carried the supplies into the |
| company's air-conditioned chill, a security guard took one look at the |
| brown uniform and lazily waved him through to the office manager's office. |
| Jones had already contacted the delivery company and, pretending to be |
| from the semiconductor company, had canceled that week's delivery run. |
|
|
| [snip...] |
|
|
| And that was that. The office manager showed Jones around the entire |
| premises, pointing out photocopiers, fax machines, bookshelves, supply |
| cabinets that had to be resupplied and the offices of executives. She even |
| got him coffee. |
|
|
| What was the point of the charade? Jones, not his real name, is a |
| corporate spook. A rival company had paid him to obtain the semiconductor |
| company's forthcoming quarterly earnings before they were announced. The |
| fee: a nifty $35,000. |
|
|
| [snip...] |
|
|
| Many former Central Intelligence Agency, National Security Agency and |
| Defense Intelligence Agency employees have sought refuge in the corporate |
| world, often heading their own companies. They even have their own trade |
| organization: the Society of Competitor Intelligence Professionals, or |
| SCIPs. |
|
|
| [You must have proper ID and know the secret handshake to join.] |
|
|
| "The scope of the problem is enormous," says Ira Winkler, security |
| consultant and author of Corporate Espionage. "On any one day there are a |
| few hundred people engaged in breaking into companies and stealing |
| information in this country. I can literally walk into a company and |
| within a few hours walk out with billions of dollars." |
|
|
| [One trick pony...] |
|
|
| [snip...] |
|
|
| 0x11>------------------------------------------------------------------------ |
|
|
| Title: 'White Hat' Hackers Probe Pores in Computer Security Blankets |
| Source: Washington Post |
| Author: Pamela Ferdinand |
| Date: April 4, 1998 |
|
|
| BOSTON: In a chaotic room crammed with computer terminals and circuit |
| boards, a long-haired man in black jeans -- "Mudge" by his Internet handle |
| -- fiddles with the knobs of a squawking radio receiver eavesdropping on |
| the beeps and tones of data transmissions. |
|
|
| Nearby, a baby-faced 22-year-old in a baggy sweat shirt, nicknamed |
| "Kingpin," analyzes reams of coded equations to break password sequences |
| percolating on his computer screen. Other figures with equally cryptic |
| identities toil in an adjoining chamber, their concentrated faces lit only |
| by a monitor's glare and the flicker of silent television sets. |
|
|
| This is the L0pht, pronounced "loft," a techie operations center in a |
| suburban warehouse several miles from city center that is inhabited by a |
| group whose members have been called rock stars of the nation's |
| computer-hacking elite. |
|
|
| The seven members of this computer fraternity-cum-high tech clubhouse have |
| defeated some of the world's toughest computer and telecommunications |
| programs and created security software that is the gold standard of |
| corporate and hacking worlds. By day, they are professional computer |
| experts, mostly in their twenties and thirties, with jobs and even wives. |
| By night, they retreat to the warehouse and their electronic aliases troll |
| the Internet for security gaps. |
|
|
| Hacking mostly for the challenge, they have exposed security flaws in |
| Microsoft Corp.'s leading network operating system, revealed holes in |
| Lotus software and figured out how to decode pager messages and mobile |
| police terminal data, among other feats. |
|
|
| Hackers typically get into supposedly secure computer systems and pinpoint |
| security breaches by deciphering elaborate number, letter and symbol |
| combinations designed by manufacturers to protect their products. If |
| security is breached, users risk having everything from private e-mail |
| read to databases erased. |
|
|
| A single, unintentional hack is not illegal, the U.S. attorney general's |
| office here says. But repeat intruders face criminal penalties, especially |
| when they compromise and damage confidential government, military or |
| financial information. |
|
|
| [Hrm.. such nice vague wording. Break in one time (the first time), |
| and it isn't illegal?!] |
|
|
| [snip...] |
|
|
| L0pht members pride themselves on a less invasive and more altruistic goal |
| just this side of the law: To locate and document Internet security gaps |
| for free for the sake of consumers who have been led to believe their |
| online transactions are secure. |
|
|
| "We think of our Net presence as a consumer watchdog group crossed with |
| public television," said "Mudge," a professional cryptographer by day who |
| declined to identify himself for security reasons. "At this point, we're |
| so high profile . . . it would be ludicrous for us to do anything wrong." |
|
|
| Even companies whose products have been hacked for security weaknesses |
| laud the social ethos and technical prowess of the members of the L0pht, |
| who frequently notify manufacturers and recommend fixes before going |
| public with their finds. Unlike villainous hackers labeled "black hats," |
| who probe cyberspace for profit and malice, Robin Hood-style "white hats" |
| like the L0pht are generally accorded respect, and even gratitude. |
|
|
| [snip...] |
|
|
| In the L0pht's most widely publicized hack, "Mudge" and a colleague |
| assaulted Microsoft's Windows NT operating system last year and found |
| inherent flaws in the algorithm and method designed to hide user |
| passwords. They demonstrated the security breach by posting their |
| victorious code on the Internet and showing how it was possible to steal |
| an entire registry of passwords in roughly 26 hours, a task Microsoft |
| reportedly claimed would take 5,000 years. |
|
|
| "It's big. It's bad. It cuts through NT passwords like a diamond tipped, |
| steel blade," boasts advertising for the latest version of their |
| security-auditing tool, dubbed "L0phtcrack." "It ferrets them out from the |
| registry, from repair disks, and by sniffing the net like an anteater on |
| dexadrene." |
|
|
| Microsoft took notice and, in an unprecedented move, executives invited |
| the L0pht to dinner at a Las Vegas hacker convention last year. They have |
| worked with the L0pht to plug subsequent security loopholes while |
| simultaneously adding hacker-style techniques to in-house testing. |
|
|
| [snip...] |
|
|
| In doing so, the L0pht is grabbing the world's attention. But for all |
| their skill in unscrambling the great riddles of technology, they remain |
| baffled by some fundamental mysteries of life. Asked what puzzle they |
| would most like to solve, "Kingpin" replied: "Girls." |
|
|
| [See! At least 2 out of 7 l0pht members hack for girls!] |
|
|
| 0x12>------------------------------------------------------------------------ |
|
|
| Title: 101 Ways to Hack into Windows NT |
| Source: Surveillance List Forum |
| Date: April 3, 1998 |
|
|
| MELBOURNE, AUSTRALIA: A study by Shake Communications Pty Ltd has |
| identified not 101, but 104, vulnerabilities in Microsoft Windows NT, |
| which hackers can use to penetrate an organisation's network. |
|
|
| Many of the holes are very serious, allowing intruders privileged access |
| into an organisation's information system and giving them the ability to |
| cause critical damage - such as copying, changing and deleting files, and |
| crashing the network. Most of the holes apply to all versions (3.5, 3.51 |
| and 4) of the popular operating system. |
|
|
| [snip...] |
|
|
| Shake Communications also provides links to patches/fixes in its |
| Vulnerabilities Database, which also covers other operating systems, |
| programs, applications, languages and hardware. |
|
|
| [snip...] |
|
|
| 0x13>------------------------------------------------------------------------ |
|
|
| Title: Suspected NASA Hacker Nabbed |
| Source: CNET news.com |
| Date: April 6, 1998 |
|
|
| TORONTO, Ontario--A 22-year-old Canadian man suspected of breaking into a |
| NASA Web site and causing tens of thousands of dollars in damage has been |
| arrested by Canadian Mounties. |
|
|
| The Royal Canadian Mounted Police in the northern Ontario city of Sudbury |
| charged Jason Mewhiney with mischief, illegal entry, and willfully |
| obstructing, interrupting, and interfering with the lawful use of data, |
| Corporal Alain Charbot said today. |
|
|
| [u4ea?!] |
|
|
| [snip...] |
|
|
| More than $70,000 worth of damage was caused at the NASA Web site and |
| officials were forced to rebuild the site and change security, Charbot |
| said. |
|
|
| The FBI tracked the hacker by tracing telephone numbers to the Sudbury |
| area. |
|
|
| The Mounties raided the homes of Mewhiney's divorced parents and seized an |
| ancient computer, a second basic computer, a high-speed modem, diskettes, |
| and documents. |
|
|
| [snip...] |
|
|
| Charbot said ironically, once hackers are released from police custody |
| they are prime candidates for cushy corporate jobs, doing the same type of |
| work--but with the permission of Web site builders. |
|
|
| [Why must these people revert to the use of 'web' terms?!] |
|
|
| 0x14>------------------------------------------------------------------------ |
|
|
| Title: CEOs Hear the Unpleasant Truth about Computer Security |
| Source: CNN |
| Author: Ann Kellan |
| Date: April 6, 1998 |
|
|
| ATLANTA (CNN) -- Computer hackers breaking into government and corporate |
| computers is estimated to be a $10 billion-a-year problem, so CEOs met |
| Monday in Atlanta to hear what government and industry experts are doing |
| about it. |
|
|
| [More expert figures on damage... <sigh>] |
|
|
| They learned, among other things, that the Pentagon alone had 250,000 |
| hacker attempts on its computer system last year, and that computer |
| networks are easy targets. |
|
|
| [And more quoting of inaccurate statistics...] |
|
|
| They also learned that there are almost 2,000 Web sites offering tips, |
| tools and techniques to hackers. |
|
|
| Among the things a hacker can do is send an e-mail to someone and attach a |
| computer program to it. The attached program will, in the words of one |
| hacker, "open up a back door" into the computer system it was sent to. |
|
|
| [Its just that easy I bet...] |
|
|
| [snip...] |
|
|
| According to IBM CEO Louis Gerstner, government and corporations need to |
| work together to set standards for security practices such as |
| hacker-resistant encryption codes. |
|
|
| "We should be encouraging the widespread adoption of encryption technology |
| right now, led by U.S.-based manufacturers," Gerstner said. |
|
|
| CIA Director George Tenet told the CEOs not to look to the government to |
| fix the problem. |
|
|
| [Now there is a good quote.] |
|
|
| [snip...] |
|
|
| 0x15>------------------------------------------------------------------------ |
|
|
| Title: Codebreakers |
| Source: Time Magazine |
| Date: April 20, 1998 |
| |
| CRACKED Thought your new digital cell phone was safe from high-tech |
| thieves? Guess again. Silicon Valley cypherpunks have broken the |
| proprietary encryption technology used in 80 million GSM (Global System |
| for Mobile communications) phones nationwide, including Motorola MicroTAC, |
| Ericsson GSM 900 and Siemens D1900 models. Now crooks scanning the |
| airwaves can remotely tap into a call and duplicate the owner's digital |
| ID. "We can clone the phones," brags Marc Briceno, who organized the |
| cracking. His advice: manufacturers should stick to publicly vetted codes |
| that a bunch of geeks can't crack in their spare time. --By Declan |
| McCullagh/Washington |
|
|
| 0x16>------------------------------------------------------------------------ |
|
|
| Title: Hackers Could Disable Military |
| Source: Washington Times |
| Author: Bill Gertz |
| Date: April 16, 1998 |
|
|
| Senior Pentagon leaders were stunned by a military exercise showing how |
| easy it is for hackers to cripple U.S. military and civilian computer |
| networks, according to new details of the secret exercise. |
|
|
| Using software obtained easily from hacker sites on the Internet, a group |
| of National Security Agency officials could have shut down the U.S. |
| electric-power grid within days and rendered impotent the |
| command-and-control elements of the U.S. Pacific Command, said officials |
| familiar with the war game, known as Eligible Receiver. |
|
|
| [snip...] |
|
|
| Pentagon spokesman Kenneth Bacon said, "Eligible Receiver was an important |
| and revealing exercise that taught us that we must be better organized to |
| deal with potential attacks against our computer systems and information |
| infrastructure." |
|
|
| [Such a neat name too!] |
|
|
| The secret exercise began last June after months of preparation by the NSA |
| computer specialists who, without warning, targeted computers used by U.S. |
| military forces in the Pacific and in the United States. |
|
|
| The game was simple: Conduct information warfare attacks, or "infowar," on |
| the Pacific Command and ultimately force the United States to soften its |
| policies toward the crumbling communist regime in Pyongyang. The "hackers" |
| posed as paid surrogates for North Korea. |
|
|
| The NSA "Red Team" of make-believe hackers showed how easy it is for |
| foreign nations to wreak electronic havoc using computers, modems and |
| software technology widely available on the darker regions of the |
| Internet: network-scanning software, intrusion tools and password-breaking |
| "log-in scripts." |
|
|
| [They successfully hack their target, yet they are "make-believe"?] |
|
|
| According to U.S. officials who took part in the exercise, within days the |
| team of 50 to 75 NSA officials had inflicted crippling damage. |
|
|
| They broke into computer networks and gained access to the systems that |
| control the electrical power grid for the entire country. If they had |
| wanted to, the hackers could have disabled the grid, leaving the United |
| States in the dark. |
|
|
| [snip...] |
|
|
| The attackers also foiled virtually all efforts to trace them. FBI agents |
| joined the Pentagon in trying to find the hackers, but for the most part |
| they failed. Only one of the several NSA groups, a unit based in the |
| United States, was uncovered. The rest operated without being located or |
| identified. |
|
|
| The attackers breached the Pentagon's unclassified global computer network |
| using Internet service providers and dial-in connections that allowed them |
| to hop around the world. |
|
|
| [snip...] |
|
|
| The targets of the network attacks also made it easy. "They just were not |
| security-aware," said the official. |
|
|
| A second official found that many military computers used the word |
| "password" for their confidential access word. |
|
|
| [*scribbling notes..*] |
|
|
| 0x17>------------------------------------------------------------------------ |
|
|
| Title: Secret Service Hackers Can't Crack Internet |
| Source: PA News |
| Author: Giles Turnbull |
| Date: April 21, 1998 |
|
|
| [So the NSA has better hackers than the Secret Service. <snicker>] |
|
|
| Professional computer hackers from the secret services were brought in |
| to attempt to hack into the Government's internal secure communications |
| system, which was launched today. |
|
|
| As part of the year-long planning and preparation of the Intranet, staff |
| from GCHQ and similar security organisations were brought in to try to hack |
| into the system. |
|
|
| But they failed. |
|
|
| [snip...] |
| |
| 0x18>------------------------------------------------------------------------ |
|
|
| Title: Now Hiring: Hackers (Tattoos Welcome) |
| Source: Tribune |
| Author: Susan Moran |
| Date: April 12, 1998 |
|
|
| Even the computer professionals who like to wear Birkenstocks and T-shirts |
| to work find the dress code of GenX hackers a bit extreme. The main |
| elements seem to be tattoos and nose rings. |
|
|
| [No stereotyping here...] |
|
|
| They'd better get used to them. Many computer hackers, some of them |
| recovering computer criminals, are adeptly turning their coveted expertise |
| into big bucks. |
|
|
| A surge in computer crime, spurred by the shift to networked computers and |
| by the growing popularity of the Internet, has created a huge demand for |
| information security experts who can help protect companies' computer |
| systems. Recent high-profile attacks on government and university computer |
| networks highlighted the vulnerability of these networks and spurred |
| corporate executives to seek ways to fortify their systems. |
|
|
| [snip...] |
|
|
| In a separate recent incident, the Justice Department last month arrested |
| three Israeli teenagers suspected of masterminding the break-ins of |
| hundreds of military, government and university computer sites to gaze at |
| unclassified information. The Federal Bureau of Investigation is also |
| investigating two California teens who linked up with their Israeli |
| co-conspirators over the Internet. |
|
|
| [Three Israeli teens? Gee, could they mean the two Cloverdale CALIFORNIA |
| kiddies and 'the analyzer'?] |
|
|
| [snip...] |
|
|
| Hackers' anarchistic style is gradually gaining acceptance in corporations |
| and government agencies, although some conservative organizations feel |
| safer renting experts from established consulting firms. |
|
|
| [Experts that consist of hackers who can dress well, and act all |
| 'corporate'.] |
|
|
| [snip...] |
|
|
| That yellow-haired hacker, a 24-year-old who prefers to be known by his |
| alias, "Route," also sports a tongue bar. His work as an information |
| security consultant is worth $1,500 to $2,000 a day to clients who want to |
| arm themselves against attacks by "crackers"--the correct term for hackers |
| who use their computer expertise to commit malicious acts of infiltrating |
| computer networks. On his own time, Route edits Phrack, a computer |
| security journal (phrack.com). And he occasionally gives talks to |
| government and corporate clients for Villella's firm, New Dimensions |
| International (www.ndi.com). Route writes his own security-related tools |
| and claims he's never used them for illegal snooping. |
|
|
| [Woohoo! Go Route! Go Route!] |
|
|
| [snip...] |
|
|
| Another hacker who now makes a healthy living consulting goes by the alias |
| "Mudge." He is a member of L0pht, a sort of "hacker think tank" consisting |
| of a handful of Boston-based hackers who work out of a loft space, where |
| they research and develop products and swap information about computer and |
| cellular phone security, among other things. Mudge consults for private |
| and public organizations, teaches classes on secure coding practices, and |
| writes his own and reviews others' code. "It pays well, but the money |
| isn't the main reason I'm doing it," he said. |
|
|
| [In a recent talk over beer, Mudge confided in me that he does it |
| for the girls. :) ] |
|
|
| What he likes best is knowing he's among the elite experts who understand |
| computer security more than big-name consultants. He's proud that he and |
| his ragged assortment of hacker friends are called in to solve problems |
| that stump the buttoned-down set. |
|
|
| "Not bad for a bunch of bit-twiddlers," he wrote in an e-mail missive. |
|
|
| 0x19>------------------------------------------------------------------------ |
|
|
| Title: Hacker Stoppers? |
| Source: InformationWeek |
| Author: Deborah Kerr |
| Date: April 27 |
|
|
| Companies bought $65 million worth of network-intrusion |
| tools last year, but capabilities still lag behind what's promised. |
|
|
| Neal Clift no longer sleeps on the floor of his office. Ten years ago, he |
| slept under his Digital VAX at Leeds University in England, listening for |
| the telltale clicks and hums that signal an intruder on his network. For |
| weeks, a hacker had been shamelessly crashing his machine, deleting files, |
| and reconfiguring controls. Clift tracked the hacker's movements, recorded |
| the keystrokes, and eventually closed up the hacker's entry points. |
|
|
| At the time, pulling late-nighters was the only way to catch a hacker, |
| since poring over system logs could only establish the hacker's patterns |
| after the fact. Now, intrusion-detection technology lets network security |
| managers and administrators catch trespassers without spending the night |
| on the office floor. |
|
|
| Intrusion-detection tools are a $65 million industry that will grow as |
| large as the firewall market, which reached about $255 million in 1997, |
| according to the Hurwitz Group, in Framingham, Mass. Touted as network |
| burglar alarms, intrusion-detection systems are programmed to watch for |
| predefineds2000] attack "signatures," or predefined bytecode trails of |
| prespecified hacks. Intrusion-detection systems also send out real-time |
| alerts of suspicious goings-on inside the network. enger] |
|
|
| But don't bet the server farm on intrusion-detection systems yet. They're |
| still new, and their capabilities are limited. No matter what you buy, |
| some portion of the enterprise will be unprotected. Intrusion-detection |
| systems also can break down under certain types of attacks, in some cases |
| even turning on their own networks under the guidance of a truly |
| knowledgeable hacker. |
|
|
| "There's no one tool to solve all the security problems throughout your |
| network," says Jim Patterson, vice president of security and |
| telecommunications at Oppenheimer Funds, in Denver... |
|
|
| [snip...] |
|
|
|
|
| 0x1a>------------------------------------------------------------------------ |
|
|
| Title: Hackers' Dark Side Gets Even Darker |
| Author: Douglas Hayward |
|
|
| LONDON -- The hacker community is splitting into a series of distinct |
| cultural groups -- some of which are becoming dangerous to businesses and |
| a potential threat to national security, an official of Europe's largest |
| defense research agency warned Thursday. New types of malicious hackers |
| are evolving who use other hackers to do their dirty work, said Alan Hood, |
| a research scientist in the information warfare unit of Britain's Defense |
| Evaluation and Research Agency (DERA). |
|
|
| Two of the most dangerous types of malicious hackers are information |
| brokers and meta-hackers, said Hood, whose agency develops security |
| systems for the British military. Information brokers commission and pay |
| hackers to steal information, then resell the information to foreign |
| governments or business rivals of the target organizations. |
|
|
| Meta-hackers are sophisticated hackers who monitor other hackers without |
| being noticed, and then exploit the vulnerabilities identified by these |
| hackers they are monitoring. A sophisticate meta-hacker effectively uses |
| other hackers as tools to attack networks. "Meta-hackers are one of the |
| most sinister things I have run into," Hood said. "They scare the hell out |
| of me." |
|
|
| [Great.. more terms and lousy journalism..] |
|
|
| DERA is also concerned that terrorist and criminal gangs are preparing to |
| use hacking techniques to neutralize military, police and security |
| services, Hood said. |
|
|
| [Criminal gangs.. oooh...] |
|
|
| [snip... lame stereotype crap] |
|
|
| 0x1b>------------------------------------------------------------------------ |
|
|
| Title: Japan Fears It's Becoming a Base for Hackers |
| Source: Daily Yomiuri On-Line |
| Author: Douglas Hayward |
| Date: 4/29/98 |
|
|
| To fill in legal loopholes that have caused an increase in unauthorized |
| computer access, the National Police Agency has set up a group of experts |
| to study how to prevent Internet crimes. |
| |
| Unlike Europe and the United States, Japan has no law prohibiting |
| unauthorized access to computers through the Internet. There has been a |
| stream of reports of anonymous hackers accessing corporate servers. |
|
|
| [Gee, they have no laws making hacking illegal, and they wonder why |
| they are becoming a base for hackers? Bright.] |
|
|
| [snip...] |
|
|
| The Japan Computer Emergency Response Team Coordination Center has been |
| studying cases of unauthorized access through the Net, and found a total |
| of 644 from the time of the center's establishment in October 1996 to last |
| month. |
| |
| Meanwhile, police uncovered 101 high-tech crimes in 1997, three times as |
| many as in the previous year. |
|
|
| 0x1c>------------------------------------------------------------------------ |
|
|
| Title: Kevin Mitnick Hacker Case Drags On and On |
| Source: ZDTV |
| Author: Kevin Poulsen |
| Date: 4/28/98 |
|
|
| [If you haven't visited, go to www.kevinmitnick.com right now.] |
|
|
| LOS ANGELES-- "Now, have we made any progress here?" |
|
|
| With those words, Judge Mariana Pfaelzer opened the latest hearing in the |
| Kevin Mitnick case in L.A.'s U.S. District Court Monday. She might as well |
| have said, "Let's get ready to rumble." |
|
|
| It's now been more than three years since a dramatic electronic manhunt |
| ended with Mitnick's arrest, national headlines, books and movie deals. |
|
|
| Since then, the excitement has faded. The books oversaturated the market; |
| the movies never got made. And the once fast-paced story of a compulsive |
| hacker with a goofy sense of humor is mired in its epilogue: the slow ride |
| to disposition over the speed-bumps of the federal justice system. |
|
|
| [snip...] |
|
|
| But only some of it. The government wants to keep a tight lid on the |
| "proprietary" software in the case, and on what it calls "hacker tools." |
| The defense can review these files, but they can't have their own copies |
| for analysis. |
|
|
| [snip...] |
|
|
| If the evidence was in paper form, the government would have probably |
| agreed. But Painter says that with electronic evidence, "it's too easy for |
| this to be disseminated by the defendants." |
|
|
| In other words, the government doesn't want the data to show up on a Web |
| site in Antigua. |
|
|
| [snip...] |
|
|
| 0x1d>------------------------------------------------------------------------ |
|
|
| Title: Millions Lost to Phone Hackers |
| Author: Andrew Probyn |
|
|
| MILLIONS of dollars are being ripped off phone users in Australia by |
| hackers using increasingly elaborate phone scams. Households, businesses |
| and mobile phone users have become victims of widespread and systematic |
| phone fraud. |
|
|
| [Hackers using phone scams?] |
|
|
| As carriers Telstra and Optus make advances in protecting their |
| telecommunications networks, hackers are increasingly adept at breaking |
| their security codes to rip off users. |
|
|
| The Herald Sun has discovered many cases of billing discrepancies blamed |
| on hackers, including one householder charged $10,000 for calls he said he |
| never made. |
|
|
| A Herald Sun investigation has also shown: SEX calls to chat lines in the |
| United States, Guyana, the Dominican Republic, Russia, Chile and the |
| Seychelles are commonly charged to other people's accounts. HACKERS can |
| divert their Internet, local and international call costs without |
| detection. |
|
|
| [Why do I think they are using 'hackers' for any sex-fiend that stole |
| a code?] |
|
|
| [snip...] |
|
|
| "Hacking could be costing consumers in the region of millions of dollars," |
| he said. "Some of these calls are very expensive - sex calls, for example, |
| can be up to $30 just to be connected." |
|
|
| [snip...] |
|
|
| 0x1e>------------------------------------------------------------------------ |
|
|
| Title: Hackers on the Hill |
| Author: Annaliza Savage |
|
|
| [FINALLY...get some incredible hackers up there to school these |
| weenies. Go l0pht!] |
|
|
| Seven hackers will face the Senate Government Affairs Committee Tuesday. |
| But they aren't in any trouble. |
|
|
| The seven hackers have been invited by Senator Fred Thompson (R-Tenn.)-- |
| the sometime-actor you may remember from such films as The Hunt For Red |
| October and Die Hard 2-- to testify about the state of the US Government's |
| computer networks. |
|
|
| The seven-- Mudge, King Pin, Brian Oblivian, Space Rouge, Weld Pond, Tan |
| and Stefan-- are all members of the L0pht, a hacker hangout in Boston, and |
| have been part of the hacker underground for years. |
|
|
| "We were surprised to get an email from a senator's aide. We have had some |
| contacts with law enforcement over the years, but this was something |
| completely different," said Weld Pond. |
|
|
| [snip...] |
|
|
| "We are trying to return the label hacker to the badge of honor it used to |
| be in the old days. A word that means knowledge and skill, not criminal or |
| script-kiddies, as it does in the popular press today," Weld Pond said. |
|
|
| [snip...] |
|
|
| When Thompson's aide, John Pede, showed up at the L0pht to discuss the |
| Senate hearings with the group, the irony of the visit wasn't wasted on |
| hackers. Weld Pond explained: "We thought about blindfolding him on the |
| way over here but decided against it in the end. The visit was a little |
| uncomfortable. When the FBI has reporters visit them they clean up quite a |
| bit and keep an eagle eye on the visitors. This was no different except |
| the tables were turned." |
|
|
| Mudge was glad to be able to show off the l0pht to the men in suits. "We |
| actually enjoyed having the government officials over. It's a wonderful |
| sight when we bring guests over to the l0pht and their jaws drop on the |
| floor after seeing all of the stuff we have managed to engineer and get |
| working. Especially when they realize it has all been without any formal |
| funding." |
|
|
| [snip...] |
|
|
| 0x1f>------------------------------------------------------------------------ |
|
|
| Title: RSA Sues Network Associates |
| Source: CNET NEWS.COM |
| Author: Tim Clark |
| Date: 5.20.98 |
|
|
| RSA Data Security is seeking to bar Network Associates from shipping any |
| Trusted Information Systems software that uses RSA encryption technology. |
|
|
| [Nyah nyah!] |
|
|
| Earlier this year, Network Associates acquired TIS, licensed by RSA to use |
| its encryption algorithms in TIS virtual private network software. RSA is |
| a wholly owned subsidiary of Security Dynamics. |
|
|
| [snip...] |
|
|
| "RSA is a company based on intellectual property," said Paul Livesay, |
| RSA's general counsel. "Right now we perceive Network Associates as having |
| an approach to doing business by acquiring companies and ignoring |
| third-party agreements, so why would we want to assign the license to TIS |
| to a party that operates in that manner?" |
|
|
| 0x20>------------------------------------------------------------------------ |
|
|
| Title: Clinton to Outline Cyberthreat Policy |
| Source: CNET NEWS.COM |
| Author: Tim Clark |
| Date: 5.21.98 |
|
|
| In a commencement speech at the U.S. Naval Academy tomorrow, President |
| Clinton is expected to highlight cyberthreats to the nation's electronic |
| infrastructure, both from deliberate sabotage and from accidents such as |
| the satellite outage that silenced pagers across the nation this week. |
| |
| Clinton also is expected to outline two new security directives, one aimed |
| at traditional terrorism and the other at cyberthreats. The cyberthreats |
| directive follows last year's report from the Presidential Commission on |
| Critical Infrastructure Protection. |
|
|
| [snip...] |
|
|
| "Clinton will announce a new policy for cyberterrorism based on the |
| recommendations of the commission, stressing the fact that we need |
| private-sector help to solve this problem, since the private sector owns |
| 80 to 90 percent of the nation's infrastructure," said P. Dennis LeNard |
| Jr., deputy public affairs officer at PCCIP. Under the new policy, that |
| agency will become the Critical Infrastructure Assurance Office, or CIAO. |
| |
| Clinton also is expected to order federal agencies to come up with a plan |
| within three to five years that identifies vulnerabilities of the nation's |
| infrastructure and responses to attacks as well as creating a plan to |
| reconstitute the U.S. defense system and economy if a cyberattack |
| succeeds, said a former White House staffer familiar with Clinton's |
| speech. |
|
|
| [Three to five years.. how.. timely.] |
|
|
| [snip...] |
|
|
| "The Department of Justice is not keen on sharing information that could |
| lead to criminal prosecutions," the official said. "The private sector |
| does not trust the FBI, and the FBI doesn't want to give out secrets. |
| They're afraid that if they share information, they may someday have to |
| testify in court." |
| |
| 0x21>------------------------------------------------------------------------ |
|
|
| Title: Programmer Sentenced for Military Computer Intrusion |
| Source: CNN |
| Date: 5.25.98 |
|
|
| DAYTON, Ohio (AP)- A computer programmer was sentenced to six months at a |
| halfway house for gaining access to a military computer that tracks Air |
| Force aircraft and missile systems. |
|
|
| Steven Liu, 24, was also fined $5,000 Friday after pleading guilty to |
| exceeding authorized access to a computer. |
|
|
| Liu, a Chinese national who worked for a military contractor in Dayton, |
| downloaded passwords from a $148 million database at Wright-Patterson Air |
| Force Base. He said he accidentally discovered the password file and used |
| it to try to find his job-performance evaluation. |
|
|
| [snip...] |
|
|
| 0x22>------------------------------------------------------------------------ |
|
|
| Title: Editorial - Hacker vs Cracker, Revisited |
| Source: OTC: Chicago, Illinois |
| Author: Bob Woods |
| Date: 5.22.98 |
|
|
| Newsbytes. If a person talks about or writes a news story regarding a |
| hacker, one creates an image that is perpetuated in a Network Associates |
| TV ad: the heavily tattooed, ratty looking cyberpunk who breaks into |
| systems and posts proprietary information on the Internet for the same |
| reason "why (I) pierce (my) tongue." The big problem, though, is that |
| person is more accurately described as a "cracker," not a "hacker." |
|
|
| ZDTV CyberCrime correspondent Alex Wellen said earlier this week that |
| "cracker" is gaining acceptance in the media -- and quoted an old column |
| of mine in the process. Because of this unexpected exposure, I decided to |
| take a second look at my old work. |
|
|
| First, here's the text of my January 23, 1996 column: |
|
|
| Our readers have their hackles up when hacker is mentioned in our |
| stories. "Hackers," they argue, are good people who just want to learn |
| everything about a computer system, while "crackers" are the ones who are |
| breaking into computer systems illegally. |
|
|
| The problem arises when the public and people who shape society get a |
| hold of terms like "hacker" -- a word once viewed as non-threatening, but |
| is now turned into a name that conjures up visions of altered World Wide |
| Web pages and crashed computer systems. |
|
|
| "Que's Computer and Internet Dictionary, 6th Edition," by Dr. Bryan |
| Pfaffenberger with David Wall, defines a hacker as "A computer enthusiast |
| who enjoys learning everything about a computer system and, through clever |
| programming, pushing the system to its highest possible level of |
| performance." But during the 1980s, "the press redefined the term to |
| include hobbyists who break into secured computer systems," Pfaffenberger |
| wrote. |
|
|
| At one time hackers -- the "good" kind -- abided by the "hacker ethic," |
| which said "all technical information should, in principle, be freely |
| available to all. Therefore gaining entry to a system to explore data and |
| increase knowledge is never unethical," according to the Que dictionary. |
|
|
| These ethics applied to the first-generation hacker community, which |
| Que said existed from roughly 1965 to 1982. While some of those people do |
| still exist, many other people who describe themselves as "hackers" are a |
| part of the current generation of people who "destroy, alter, or move data |
| in such a way that could cause injury or expense" -- actions that are |
| against the hacker ethic, Que's dictionary said. Many of those actions are |
| also against the law. |
|
|
| Today's hacker generation -- the ones bent on destruction -- are more |
| accurately called "crackers." Que defines such a person as "A computer |
| hobbyist who gets kicks from gaining unauthorized access to computer |
| systems. Cracking is a silly, egotistical game in which the object is to |
| defeat even the most secure computer systems. Although many crackers do |
| little more than leave a 'calling card' to prove their victory, some |
| attempt to steal credit card information or destroy data. Whether or not |
| they commit a crime, all crackers injure legitimate computer users by |
| consuming the time of system administrators and making computer resources |
| more difficult to access." |
|
|
| Here's the rub: whenever the media, including Newsbytes, uses the term |
| "hacker," we are hit with complaints about the term's usage. E-mails to |
| us usually say "I'm a hacker, yet I don't destroy anything." In other |
| words, the people who write us and other media outlets are a part of the |
| first generation of hackers. |
|
|
| But the media reflects society as much as, if not more than, they |
| change or alter it. Today's culture thinks of hackers as people who |
| destroy or damage computer systems, or ones who "hack into" computers to |
| obtain information normal people cannot access. While it's probably the |
| media's fault, there's no going back now -- hackers are now the same |
| people as crackers. |
|
|
| Besides, if a person outside of the computer biz called someone a |
| cracker, images of Saltines or a crazy person or an investigator in a |
| popular British television series would probably come to mind. For most |
| people on the street, the last thing they would think of is a person they |
| know as a hacker. |
|
|
| So, what's to be done about the situation? Not a whole heck of a lot, |
| unfortunately. The damage is done. If more people in the "general public" |
| and the "mainstream media" read this news service and saw this article, |
| some headway might be made. But even if they did, cultural attitudes and |
| thoughts are very difficult to change. For those people in the US -- |
| remember New Coke? Or the metric system? If you're outside the US, can you |
| imagine calling football "soccer?" |
|
|
| And to the first generation of hackers -- those of us "in the know" in |
| this industry do know about you. When we report on hackers nowadays, we're |
| not talking about you, and we do not mean to insult you. Honest. |
|
|
| === Today's Opinion |
|
|
| Okay, so that last paragraph was a bit on the hokey side. Alright, so |
| it was really hokey. But from what I remember, we had been getting quite a |
| few angry e-mails at the time regarding our usage of "hacker," and I was |
| trying to do a bit of damage control. But if memory serves me correctly, |
| we received a couple of "nice try" letters after we published the |
| editorial. Nice try? Well, I thought it was. |
|
|
| But, was it a "safe" editorial? Sure. But it was -- and still is -- |
| also "safe" to just write about "hackers" and offend a few people, rather |
| than use the term "cracker" and leave a bunch of people scratching their |
| heads over what the heck a "cracker" even was. |
|
|
| While I'm seeing "cracker" more and more in computer-related |
| publications (unfortunately, though, not in ours as much as I'd like to |
| see) these days, the term is sorely lacking in the widely |
| read/viewed/listened-to media outlets. |
|
|
| I'll take the liberty of quoting what ZDTV's Wellen quoted me as saying |
| two years ago: "If more people in the 'general public' and the 'mainstream |
| media' read this news service and saw this article, some headway might be |
| made (in accurately calling people crackers instead of hackers)." |
|
|
| Now, I can see a mainstream media-type -- I used to be one of these |
| people, by the way -- wondering how in the heck can they get their average |
| seventh-grade audience to understand that a cracker is different from a |
| hacker. It's easy for us computer/IT journalist types to write to our |
| expectations of our audience, because it is generally pretty much like us. |
|
|
| The answer, though, is pretty easy. Here's an example: |
|
|
| "Two teenage hackers, more accurately known as 'crackers,' illegally |
| entered into the Pentagon's computer system and took it out in an |
| overnight attack." The real trick, then, is to never again use "hacker" |
| in the story. Just use "cracker." Your audience will pick up on this, |
| especially if you do it in all of your stories. I promise. |
|
|
| So there. My unwieldy media consulting bill is now in the mail to all |
| of the non-computing local and national media outlets. |
|
|
| 0x23>------------------------------------------------------------------------ |
|
|
| Title: Windows NT Security Under Fire |
| Author: Chris Oakes |
| Date: 6.1.98 |
|
|
| Listen to security expert and consultant Bruce Schneier and he'll tell you |
| that Windows NT's security mechanism for running virtual private networks |
| is so weak as to be unusable. Microsoft counters that the issues Schneier |
| points out have mostly been addressed by software updates or are too |
| theoretical to be of major concern. |
|
|
| Schneier, who runs a security consulting firm in Minneapolis, says his |
| in-depth "cryptanalysis" of Microsoft's implementation of the |
| Point-to-Point Tunneling Protocol (PPTP) reveals fundamentally flawed |
| security techniques that dramatically compromise the security of company |
| information. |
| |
| "PPTP is a generic protocol that will support any encryption. We broke the |
| Microsoft-defined [encryption] algorithms, and also the Microsoft control |
| channel." However, he said he was unaware of some of Microsoft's NT 4.0 |
| updates when he ran his tests. |
| |
| With relative ease, intruders can exploit the flaws, Schneier said, which |
| he summarizes as weak authentication and poor encryption implementation. |
| The result is that passwords can be easily compromised, private |
| information can be disclosed, and servers used to host a virtual private |
| network, or VPN, can be disabled through denial-of-service attacks, |
| Schneier said. |
| |
| It's kindergarten cryptography. These are dumb mistakes," Schneier said. |
|
|
| In letting companies use the public Internet as a means for establishing |
| "private" company networks, VPN products use the protocol to establish the |
| "virtual" connections between remote computers. |
|
|
| PPTP secures the packets sent via the Internet by encapsulating them in |
| other packets. Encryption is used to further secure the data contained in |
| the packets. It is the scheme Microsoft uses for this encryption that |
| Schneier says is flawed. |
|
|
| Specifically, Schneier's analysis found flaws that would let an attacker |
| "sniff" passwords as they travel across a network, break open an |
| encryption scheme, and mount denial-of-service attacks on network servers, |
| which render them inoperable. Confidential data is therefore compromised, |
| he said. |
|
|
| The nature of the flaws varied, but Schneier identified five primary ones. |
| For example, Schneier found a method of scrambling passwords into a code |
| -- a rough description of "hashing" -- to be simple enough that the code |
| is easily broken. Though 128-bit "keys" can be used to access the |
| encryption feature of the software, Schneier said the simple |
| password-based keys that it allows can be so short that information could |
| be decrypted by figuring out what may be very simple passwords, such as a |
| person's middle name. |
|
|
| "This is really surprising. Microsoft has good cryptographers in their |
| employ." The problem, he said, is that they're not adequately involved in |
| product development. |
|
|
| Schneier emphasized that no flaws were found in the PPTP protocol itself, |
| but in the Windows NT version of it. Alternate versions are used on other |
| systems such as Linux-based servers. |
|
|
| Microsoft's implementation is "only buzzword-compliant," Schneier said. |
| "It doesn't use [important security features like 128-bit encryption] |
| well." |
|
|
| Windows NT has in the past been the object of several security complaints, |
| including denial-of-service vulnerabilities. |
|
|
| Microsoft says the five primary weaknesses Schneier has called attention |
| to are either theoretical in nature, previously discovered, and/or have |
| been addressed by recent updates to the operating system software. |
|
|
| "There's really not much in the way of news here," said Kevin Kean, an NT |
| product manager at Microsoft. "People point out security issues with the |
| product all the time. |
|
|
| "We're on our way to enhancing our product to take care of some of these |
| situations already," Kean said. |
|
|
| He acknowledged that the password hashing had been fairly simple, but that |
| updates have used a more secure hashing algorithm. He also contends that |
| even a weak hashing can be relatively secure. |
|
|
| The issue of using simple passwords as encryption keys is relevant to |
| individual company policy more than Microsoft's product. A company that |
| has a policy requiring employees to use long, more complex passwords can |
| ensure that their network encryption is more secure. An update to the |
| product, Kean said, lets administrators require a long password from |
| company employees. |
|
|
| On another issue, where a "rogue" server could fool a virtual private |
| network into thinking it was a legitimate node on the network, Karan |
| Khanna, a Windows NT product manager, said while that was possible, the |
| server would only intercept of a "stream of gobbledygook" unless the |
| attacker had also cracked the encryption scheme. That and other issues |
| require a fairly difficult set of conditions, including the ability to |
| collect the diverging paths of VPN packets onto a server, to come into |
| place. |
|
|
| For that reason, Microsoft insists its product offers a reasonable level |
| of security for virtual private networks, and that upcoming versions of |
| the software will make it stronger. |
|
|
| Windows NT security expert Russ Cooper, who runs a mailing list that |
| monitors problems with Windows NT, agrees with Microsoft that most of |
| Schneier's findings have been previously turned up and discussed in forums |
| like his. What Schneier has done is tested some of them, he said, and |
| proven their existence. |
|
|
| But he points out that fixes for the problems have only recently been |
| released, outdating Schneier's tests. The problems may not have been all |
| successfully addressed by the fixes, Cooper said, but represent an unknown |
| that may negate some of Schneier's findings. |
|
|
| On Schneier's side, however, Cooper agrees that it typically takes |
| publicity of such weaknesses to get Microsoft to release fixes. "Folks |
| need to get better response from Microsoft in terms of security," Cooper |
| said. |
|
|
| He also added support to a point that Schneier makes -- that Microsoft |
| treats security more casually than other issues because it has no impact |
| on profit. |
|
|
| "Microsoft doesn't care about security because I don't believe they think |
| it affects their profit. And honestly, it probably doesn't." Cooper |
| believes this is part of what keeps them from hiring enough security |
| personnel. |
|
|
| Microsoft vehemently contests the charge. Microsoft's Khanna said in |
| preparing the next release of the operating system, the company has |
| installed a team to attack NT, an effort meant to find security problems |
| before the product is released. |
|
|
| And, Microsoft reminds us, no product is totally secure. "Security is a |
| continuum," Microsoft's Kean said. "You can go from totally insecure to |
| what the CIA might consider secure." The security issue at hand, he said, |
| lies within a reasonable point on that continuum. |
|
|
| 0x24>------------------------------------------------------------------------ |
|
|
| Title: New Decoy Technology Designed to Sting Hackers |
| Source: ZDNet |
| Author: Mel Duvall |
|
|
| There was a sweet bonus for Network Associates Inc. in its recent |
| acquisition of intrusion detection company Secure Networks Inc. The |
| security vendor gained access to a new technology that is designed to |
| sting hackers, not just keep them out. |
|
|
| Secure Networks is developing a product, code-named Honey Pot, that is |
| essentially a decoy network within a network. The idea is to lure hackers |
| into the decoy, like flies to a honey pot, to gain as much information |
| about their hacking techniques and identity as possible. |
|
|
| "It's a virtual network in every way, with one exception - it doesn't |
| exist," Secure Networks President Arthur Wong said. |
|
|
| The product is unusual in that it acknowledges a fact of life few |
| companies are willing to admit - that hackers can and do break into |
| corporate networks. |
|
|
| Tom Claire, director of product management at Network Associates, said |
| after years of denying the problem exists, companies are beginning to take |
| intrusion detection seriously. |
|
|
| "Now they're starting to say, maybe I can watch what hackers are doing in |
| my network and find out what they're after and how they do it," he said. |
| "Then they can use that knowledge to make their systems better." |
|
|
| The seriousness of the issue was underscored last week with reports that |
| America Online Inc. was suffering from a series of attacks during which |
| hackers gained access to subscriber and AOL staff accounts. The intruders |
| appeared to gain access by tricking AOL customer service representatives |
| into resetting passwords, based on information they obtained by looking at |
| member profiles. |
|
|
| Honey Pot, which is due to be released in the fourth quarter, draws |
| hackers in by appearing to offer access to sensitive data. |
|
|
| Once into the dummy network, hackers spend their time trolling through |
| fake files, while the software gains information about their habits and |
| tries to trace their source. |
|
|
| Wong said it's unlikely a hacker's identity can be obtained after one |
| visit to the Honey Pot, but once a hacker breaks into a system, he or she |
| tends to come back for more. |
|
|
| "It's like tracing a phone call - the more they return, the more you can |
| narrow down their identity," Wong said. |
|
|
| Larry Dietz, a security analyst at Zona Research Inc., said another |
| security company, Secure Computing Corp., built offensive capabilities |
| into its Sidewinder firewall as early as 1996, but "strike back" |
| technologies, such as Honey Pot, are still relatively unused in the |
| corporate market. |
|
|
| "It's a good idea if you have a sophisticated user that knows what to do |
| with the technology," Dietz said. "But how many companies have the staff |
| or the expertise to be security cops?" |
|
|
| 0x25>------------------------------------------------------------------------ |
|
|
| Title: Reno dedicates high-tech crime fighting center |
| Source: Knight Ridder |
| Author: Clif leblanc |
|
|
| COLUMBIA, S.C. -- With the grandeur of a French royal palace, the nation's |
| first school for prosecutors was dedicated Monday with a challenge from |
| U.S. Attorney Janet Reno to fight 21st century electronic crime. |
|
|
| ``When a man can sit in St. Petersburg, Russia, and steal from a New York |
| bank with wire transfers, you know you've got a problem,'' Reno told a |
| conference room full of dignitaries at the National Advocacy Center. |
|
|
| She said the high-tech equipment the center on the University of South |
| Carolina campus offers will allow prosecutors to ``fight those who would |
| use cyber tools to invade us.'' |
|
|
| An estimated 10,000 federal, state and local prosecutors annually will |
| learn from the nation's best government lawyers at the $26 million center, |
| which takes up about 262,000 square feet and has 264 dormitory rooms for |
| prosecutors in training. Students -- practicing prosecutors from across |
| the nation -- will be taught to use digital wizardry and conventional |
| classroom training to win convictions against computer criminals, health |
| care frauds, employers who discriminate and run-of-the-mill offenders. |
|
|
| The center is a unique facility dreamed up 17 years ago by then-U.S. |
| Attorney General Griffin Bell so government lawyers at all levels could |
| learn to prosecute crime better. |
|
|
| Reno, formerly a state prosecutor in Dade County, Fla., said she was |
| especially happy the center will help state and local prosecuting |
| attorneys, too. ``I'm a child of the state court system,'' she said. ``It |
| is my hope that this institution can lead the way in properly defining the |
| roles of state and local ... law enforcement.'' |
|
|
| About 95 percent of all prosecutions in the nation are by local |
| prosecuting attorneys, said William L. Murphy, president of the National |
| District Attorneys Association, who attended Monday's opening. |
|
|
| Reno said she also wants the center to tap into University of South |
| Carolina faculty to teach prosecutors about office management, budgeting, |
| alternatives to litigation and even to find better ways for citizens and |
| police to work together to fight crime. |
|
|
| ``We can all blaze a trail to make government responsible to its people |
| and still make people accountable,'' Reno said in a 15-minute dedication |
| speech. |
|
|
| If the center works as she envisions it, federal prosecutors will get |
| better at trying capital cases, and DNA evidence will reduce the chances |
| that innocent people will be wrongly convicted, Reno said. |
|
|
| In her third trip to Columbia, Reno joked good reports from students |
| trained at the center have put a stop to early complaints of ``who wants |
| to go to Columbia?'' |
|
|
| Reno thanked Sen. Fritz Hollings for pushing the idea of the center. She |
| recalled that in their first meeting Hollings confronted her with a Forbes |
| magazine article that reported the Justice Department was too big, ``and |
| there was this little center he wanted to talk about.'' |
|
|
| USC President John Palms said when Hollings first approached him about |
| placing the center at the school, Palms' immediate answer was: ``Whatever |
| it is, yes.'' |
|
|
| But the center has a much bigger role for USC, Palms said. He described |
| the dedication as, ``an event that's probably as important as anything |
| that's ever happened at the university.'' |
|
|
| Hollings, who is seeking re-election to a seventh term in the U.S. |
| Senate, jokingly described the finished facility as, ``a little |
| Versailles.'' The 1,300-room Palace of Versailles was the opulent home of |
| the French royal family for more than 100 years. |
|
|
| ``This is the most beautiful building the government has ever built,'' |
| Hollings said. |
|
|
| ``We've got the best of the best for America's prosecutors,'' Hollings |
| said. ``Now it's up to us to produce the best.'' [Image] |
|
|
| 0x26>------------------------------------------------------------------------ |
|
|
| Title: Man poses as astronaut steals NASA secrets |
| Source: Reuters |
| Date: 6.4.98 |
|
|
| HOUSTON (Reuters) [6.4.98] - A licensed airline pilot posing as an |
| astronaut bluffed his way into a top-security NASA facility and got secret |
| information on the space shuttle during an eight-month deception, federal |
| prosecutors said Wednesday. |
| |
| Jerry Alan Whittredge, 48, faces up to five years in jail and a $250,000 |
| fine for misrepresenting himself as a federal employee, the U.S. |
| Attorney's Office for Southern Texas said. |
| |
| Whittredge contacted NASA's Marshall Space Center in Huntsville, Alabama, |
| in November, claiming he had been chosen for a space shuttle mission and |
| requesting a tour of the facility. |
| |
| According to an affidavit by NASA special agent Joseph Gutheinz, |
| Whittredge told NASA officials that he was a CIA agent and held the Medal |
| of Honor. |
| |
| On the basis of his false credentials he was granted a tour on Nov. 21 and |
| 22. |
| |
| "Mr. Whittredge was permitted to sit at the console of NASA Mission |
| Control (NASA's most secure area) at Marshall Space Flight Center during a |
| shuttle mission," the affidavit said. |
| |
| In March Whittredge tricked NASA into giving him confidential information |
| about the shuttle's propulsion system and in May he hoodwinked officials |
| at Kingsville Naval Air Station in Texas into giving him training on a |
| T-45 flight simulator. |
| |
| Gutheinz said Whittredge had most recently been living in Texas but did |
| not appear to be employed there and that he also had a permanent address |
| in Florida. |
| |
| Whittredge made an initial appearance in court on Tuesday and is due to |
| attend a bond hearing on Friday. |
|
|
| 0x27>------------------------------------------------------------------------ |
|
|
|
|
| DEF CON 6.0 Convention Announcement #1.00 (03.27.98) |
| July 31-August 2 @ The Plaza Hotel and Casino in Las Vegas |
|
|
| IN SHORT:-------------------------------------------------------------------- |
|
|
| WHAT: Speakers & partying in Vegas for hackers from the world over. |
| WHEN: July 31st - August 2nd |
| WHERE: Las Vegas, Nevada @ The Plaza Hotel and Casino |
| COSTS: $40 at the door |
| MORE INFO: http://www.defcon.org/ or email info@defcon.org |
|
|
|
|
| 0x28>------------------------------------------------------------------------ |
|
|
| Network Security Solutions Conference Announcement |
|
|
| July 29th and 30th, Las Vegas Nevada |
|
|
|
|
| ****************** Call For Papers Announcement *************************** |
|
|
| Network Security Solutions is now accepting papers for its 1998 event. |
| Papers and requests to speak will be received and reviewed from March 24th |
| until June 1st. Please submit an outline on a self selected topic |
| covering either the problems or solutions surrounding network security. |
| Topics of interest include Intrusion Detection Systems (IDS), distributed |
| languages, network design, authentication systems, perimeter protection, |
| and more. Talks will be an hour with a half hour for Q&A. There will be |
| LCD projectors, overhead, and slide projectors. |
|
|
| Updated announcements will be posted to newsgroups, security mailing lists, |
| email, or visit the website at http://www.blackhat.com/ |
|
|
|
|
| 0x29>------------------------------------------------------------------------ |
|
|
| The Program Chair, Win Treese of Open Market, Inc., and the Program |
| Committee announce the availability of the Call for Papers for: |
|
|
| 8th USENIX Security Symposium |
| August 23-26, 1999 |
| Marriott Hotel, Washington, D.C. |
|
|
| Sponsored by USENIX, the Advanced Computing Systems Association |
| In cooperation with The CERT Coordination Center |
|
|
| ================================================ |
| IMPORTANT DATES FOR REFEREED PAPERS |
| Paper submissions due: March 16, 1999 |
| Author notification: April 21, 1999 |
| Camera-ready final papers due: July 12, 1999 |
| ================================================ |
|
|
| If you are interested in submitting a paper to the committee, proposing |
| an Invited Talk, or proposing a tutorial, you can find the Call for |
| Papers at http://www.usenix.org/events/sec99/cfp.html. |
|
|
| The USENIX Security Symposium brings together researchers, practitioners, |
| system administrators, system programmers, and others interested in the |
| latest advances in security and applications of cryptography. |
|
|
| Symposium topics include: |
|
|
| Adaptive security and system management |
| Analysis of malicious code |
| Applications of cryptographic techniques |
| Attacks against networks and machines |
| Authentication & authorization of users, systems & applications |
| Detecting attacks, intrusions, and computer misuse |
| Developing secure systems |
| File and file system security |
| Network security |
| New firewall technologies |
| Public key infrastructure |
| Security in heterogeneous environments |
| Security incident investigation and response |
| Security of agents and mobile code |
| Technology for rights management & copyright protection |
| World Wide Web security |
|
|
| ============================================================= |
| USENIX is the Advanced Computing Systems Association. Its members are |
| the computer technologists responsible for many of the innovations in |
| computing we enjoy today. To find out more about USENIX, visit its |
| web site: http://www.usenix.org. |
|
|
| 0x2a>------------------------------------------------------------------------ |
|
|
| Last Call For Participation - RAID 98 |
|
|
| (also available at http://www.zurich.ibm.com/~dac/RAID98) |
|
|
| First International Workshop on the Recent Advances in Intrusion |
| Detection |
|
|
| September 14-15, 1998 Louvain-la-Neuve, Belgium |
|
|
| We solicit your participation in the first International Workshop on the |
| Recent Advances in Intrusion Detection (RAID 98). |
|
|
| This workshop, the first in an anticipated annual series, will bring |
| together leading figures from academia, government, and industry to talk |
| about the current state of intrusion detection technologies and paradigms |
| from the research and commercial perspectives. |
|
|
|
|
| We have scheduled RAID 98 immediately before ESORICS 98, at the same time |
| as CARDIS 98, and at the same location as both of these conferences. This |
| provides a unique opportunity for the members of these distinct, yet |
| related, communities to participate in all these events and meet and share |
| ideas during joined organized external events. |
|
|
|
|
| The RAID 98 web site: http://www.zurich.ibm.com/~dac/RAID98, |
|
|
| The ESORICS 98 web site: http://www.dice.ucl.ac.be/esorics98. |
|
|
| The CARDIS 98 web site: http://www.dice.ucl.ac.be/cardis98/ |
|
|
| 0x2b>------------------------------------------------------------------------ |
|
|
| Computer Security Area (ASC) / DGSCA |
|
|
| DISC 98 |
|
|
| "Individual Responsability" |
| |
| Fifth Computer Security Event In Mexico |
|
|
| Mexico, D.F. November 2-6, 1998 |
|
|
| ========================================================================== |
|
|
| C A L L F O R P A P E R S |
|
|
| The goal of DISC 98 event is to create a conscience about the strategies |
| of security to protect information between the community who uses computers. |
| This year the DISC belongs to the most important events of Mexico. |
|
|
| The computing general congress (http://www.org.org.mx/cuarenta) |
| celebrates forty years of computing in Mexico and convoques those |
| specialist in computer sucurity to participate on this as lecture. |
|
|
| "Individual responsability" is the slogan of this year and suggest |
| that the security of an organization should be totally supported |
| by directive, security responsables, managers, and system's users. |
|
|
|
|
| WWW : http://www.asc.unam.mx/disc98 |
|
|
|
|
| 0x2c>------------------------------------------------------------------------ |
|
|
| C A L L F O R P A P E R S |
|
|
| Assurance for the Global Convergence: |
| Enterprise, Infrastructure and Information Operations |
|
|
| InfoWarCon-9 |
| Mount Royal Hotel, London, UK |
| December 7-9 |
|
|
| December 7 - Tutorials |
| December 8-9 General Session. |
|
|
| Sponsors: |
| MIS Training Institute - www.misti.com |
| Winn Schwartau, Interpact, Inc. - www.infowar.com |
|
|
|
|
| For more information contact: Voice: 508.879.7999 Fax: 508.872.1153 |
| Exhibitors & Sponsorship: Adam Lennon - Alennon@misti.com |
| Attendance & Registration: www.misti.com |
|
|
|
|
| ----[ EOF |
|
|