| ---[ Phrack Magazine Volume 8, Issue 54 Dec 25th, 1998, article 11 of 12 |
|
|
|
|
| -------------------------[ P H R A C K W O R L D N E W S |
|
|
|
|
| --------[ Issue 54 |
| |
|
|
| Hi. A few changes have been made to Phrack World News (PWN) and will |
| probably change again in the future. Because of the increase of news on |
| the net, security, hackers and other PWN topics, it is getting more |
| difficult to keep Phrack readers informed of everything. To combat this |
| problem, PWN will include more articles, but only relevant portions (or |
| the parts I want to make smart ass remarks about). If you would like to |
| read the full article, look through the ISN (InfoSec News) archives |
| located at: |
|
|
| ftp.repsec.com /pub/text/digests/isn |
|
|
| If you would like timely news delivered with less smart ass remarks, you |
| can always subscribe to ISN by mailing majordomo@repsec.com with 'subscribe |
| isn' in the body of your mail. |
|
|
| The following articles have been accumulated from a wide variety of places. |
| When known, original source/author/date has been included. If the information |
| is absent, then it wasn't sent to us. |
|
|
| As usual, I am putting some of my own comments in brackets to help readers |
| realize a few things left out of the articles. Comments are my own, and |
| do not necessarily represent the views of Phrack, journalists, government |
| spooks, my cat, or anyone else. If you want to see more serious comments |
| about the piss poor journalism plagueing us today, visit the Security |
| Scene Errata web page: http://www.attrition.org/errata/ |
|
|
| If you feel the need to send me love letters, please cc: |
| route@infonexus.com so he can see I really do have fans. If you would like |
| to mail my cat, don't, he hates you because you are a plebian in his eyes. |
| Meow. |
|
|
| This installment of PWN is dedicated to Feds, Hackers, and blatant stupidity. |
| It was brought to you by the letters that collectively spell 'dumb shit'. |
|
|
| - disorder |
|
|
| --------[ Issue 54 |
|
|
| 0x1: Teen Crackers Admit Guilt |
| 0x2: FBI grads get gun, badge, and now, a laptop |
| 0x3: Meet the Hacker Trackers |
| 0x4: Justice Department to Hire Computer Hackers |
| 0x5: A Cracker-Proofing Guarantee |
| 0x6: First-Ever Insurance Against Hackers |
| 0x7: New Unit to Combat High-Tech Crime (National Police Agency) |
| 0x8: First 'Cyber Warrior' Unit is Poised for Operational Status (DOD) |
| 0x9: Tracking Global Cybercrime (Chamber of Commerce) |
| 0xa: FBI Opens High-Tech Crisis Center |
| 0xb: Navy fights new hack method |
| 0xc: Pentagon Blocks DoS Attack |
| 0xd: Hackers Elude Accelerator Center Staff |
| 0xe: Cyberattacks leave feds chasing 'vapor' |
| 0xf: Congress Attacks Cyber Defense Funds |
| 0x10: Mudge on Security Vendors |
| 0x11: More delays for Mitnick trial |
| 0x12: 'Back door' doesn't get very far |
| 0x13: ICSA Goon Pretends to be a Hacker |
| 0x14: Is Your kid a Hacker |
| 0x15: Paging Network Hijacked |
| 0x16: FBI busts hacker who sold clandestine accounts on PageNet system |
| 0x17: EFF DES Cracker Machine Brings Honesty to Crypto Debate |
| 0x18: Hacking site gets hacked |
| 0x19: From Criminals to Web Crawlers |
| 0x1a: Running a Microsoft OS on a Network? Our Condolences |
| 0x1b: Security expert explains New York Times site break in |
| 0x1c: Merriam-Webster Taken Offline Old Fashioned Way |
| 0x1d: Long Haired Hacker Works Magic |
| 0x1e: Body of Evidence |
| 0x1f: The Golden Age of Hacktivism |
| 0x20: Phrack straddles the world of hackers |
| 0x21: Cops see little hope in controlling computer crime |
|
|
| 0x1>------------------------------------------------------------------------- |
|
|
| Title: Teen Crackers Admit Guilt |
| Source: Wired |
| Date: 1:10pm 11.Jun.98.PDT |
|
|
| Two California teenagers have pleaded guilty to federal charges of |
| cracking Pentagon computers, the San Francisco Chronicle reports. |
| |
| Terms of the plea are still being negotiated after a meeting last week |
| between attorneys for the youths and federal officials, the newspaper |
| said. Neither youth is expected to serve time in custody, sources close to |
| the case said. |
| |
| In February, the FBI raided the Cloverdale homes of the two suspected |
| crackers -- nicknamed Makaveli, 16, and TooShort, 15 -- and seized |
| computers believed to have been used to break into unclassified computer |
| systems in government agencies, military bases, and universities. |
|
|
| [Sucks to be busted. Sucks worse to plead guilty to being a script |
| kiddie.] |
|
|
| The youths were never formally arrested in the FBI probe. US Deputy |
| Defense Secretary John Hamre called the breach "the most organized and |
| systematic attack" to date on Pentagon systems. |
| |
| [Feds only enjoy sticking guns in the faces of these kids. Not actually |
| arresting them.] |
|
|
| 0x2>------------------------------------------------------------------------- |
|
|
| Title: FBI grads get gun, badge, and now, a laptop |
| Source: TechWeb |
| Date: 7.22.98 |
|
|
| When FBI special-agent trainees graduate from the bureau academy at |
| Quantico, Va., they are each issued a gun, a badge -- and now, a laptop |
| computer. |
|
|
| [Unfortunately, they don't always get a clue.] |
|
|
| Crime today often involves the use of sophisticated technology, and new |
| agents have to be able to shoot straight, learn the law, and be able to |
| use technology. |
|
|
| Part of the FBI's duty is to investigate computer-related crimes and |
| issues of national security. Because it needs these specialized skills, |
| the bureau is in competition with other agencies such as the Secret |
| Service and the Central Intelligence Agency (CIA) -- as well as the |
| private sector -- for recruits. |
|
|
| [Great low pay! Lots of travel! No respect! Come join the FBI!] |
|
|
| Attorney General Janet Reno, addressing a conference on children's safety |
| on the Internet in December, called on the technology community to help |
| law enforcement. |
|
|
| But Reno's call does not mean making a computer geek into a G-man. The |
| FBI recruits in the high-tech industry and in colleges and universities |
| for special agents with other attributes besides computer-science degrees. |
| |
| "There is not a specific category [in the FBI] for someone with more |
| computer skills," said Special Agent Ron Van Vraken, an FBI spokesman. |
| "But someone with skills and experience is highly marketable. We've |
| recognized we need to attract those people into the FBI." |
| |
| The FBI is not alone. |
|
|
| The CIA has a long listing of Web postings for technology-related jobs. |
| There are ongoing requirements for knowledge-based systems engineers, |
| software developers, and electronics engineers listed alongside jobs such |
| as theatrical-effects specialists and clandestine service trainees. |
|
|
| [Yet the CIA is scrambling to find jobs for all the cold-war spook |
| rejects...] |
|
|
| Although the CIA is not a law-enforcement agency like the FBI and the |
| Secret Service, it, too, chases "bad guys" and needs people trained in |
| technology, said Anya Guilsher, an agency spokeswoman. "We have a great |
| interest in people with advanced technology skills," she said. |
| |
| The Secret Service, which investigates financially related crimes as well |
| as protects the president, is also looking. Its jobs listings include |
| openings for computer specialists and telecommunications specialists. |
|
|
| The ideal candidate for these agencies is not necessarily a computer wiz, |
| said Ron Williams, a former Secret Service agent and current CEO of |
| high-tech security company Talon Technology. |
|
|
| "The ideal candidate is well-rounded," he said, adding they should also |
| understand computers, have good communications skills, and know human |
| behavior. |
|
|
| "To catch a criminal, you have to think like one," Williams said. "You can |
| take agents, and if they have good street smarts and good computer skills, |
| you can make them into hacker sleuths." |
|
|
| [Hypothetically.. since they haven't done it yet.] |
|
|
| 0x3>------------------------------------------------------------------------- |
|
|
| Title: Meet the Hacker Trackers |
|
|
| A gang of convicts dressed in cartoon-striped uniforms shuffle slowly |
| along a sidewalk, searing in the noon-day sun. This is downtown Phoenix, a |
| low-rise high-tech city with a decidedly old- fashioned approach to crime. |
| From her office on the sixth floor of the county attorney's office, the |
| prosecutor remains unmoved by the sight of the prisoners. "People 'round |
| here don't have much in the way of sympathy for criminals of any kind. And |
| most of those guys are real criminals, not jumped up nobodies screaming |
| for attention - the kind of people I deal with!" |
|
|
| Meet Gail Thackeray, the world's foremost legal expert on computer crime. |
| A former assistant attorney general of the state of Arizona, Thackeray has |
| been fighting hackers and fraudsters for nearly 25 years. Now she works as |
| a prosecutor for the Maricopa County attorney's office, a jurisdiction the |
| size of New England that takes in all of Phoenix. It's most famous as the |
| home of Sheriff Joe Arpaio, "the meanest sheriff in America". This is the |
| man responsible for the convicts in stripes. He has made his reputation by |
| toughening up prison conditions, to loud hollers of approval from |
| freedom-loving Arizonans. |
|
|
| Good citizens of Maricopa County can now walk the streets in safety, but |
| for the big technology companies that have moved to the "valley of the |
| sun", the unseen hand of hackers and computer phreaks is proving a major |
| distraction. Whether it's a left-over hippy feeling, the University campus |
| or just a reaction to the extreme heat, Phoenix is a top spot for computer |
| criminals. Thackeray is there to stop them. |
|
|
| Arizona has perhaps the United States' strongest legal code against the |
| activities of hackers, but sometimes Gail aches to fight fire with fire. |
| "We have to document every step of the way we investigate. They don't need |
| to have our education. They just need one other crook showing them, like |
| monkeys at a keyboard, how to imitate the crime. The bulletin boards were |
| the precursors to this, but the Net has exploded it down to the individual |
| level anywhere in the world. You don't need sophistication, you don't even |
| need very good equipment - one of the best hackers we've ever dealt with |
| had a Compaq luggable 286 and he was wreaking havoc around the world. Just |
| a list of his route on different systems attached to the Internet would |
| keep me in the hacker business for the rest of my life - it goes on for |
| pages." |
|
|
| Getting away with it |
|
|
| We move from her office to the conference room next door. Thackeray |
| proudly displays her new Compaq notebook. Her famous slide show is now |
| held on the notebook's hard disk. For more years than she'd care to |
| remember, Thackeray has been showing her slides to police forces and |
| prosecutors across the United States, advising them how to build a case |
| against hackers. She also trains police forces all over the country, |
| including secret service agents at the Georgia Federal training centre. |
| Even the bad guys have been known to call her to find out what the cops |
| have been up to. |
| |
| Although she has been a hacker tracker for 25 years, Thackeray is more |
| depressed than ever by the escalating scale of computer crime. The Web, |
| she says, has made it impossible to catch the crooks. "Even if it's the |
| boy next door, we haven't a chance. He may be doing something rotten to |
| your high-tech consulting firm, he may be next door trying to steal your |
| stuff - but he's looping through a long-distance carrier, a corporate |
| phone system, three Internet providers and circling the world twice before |
| he hits you. That's the problem from our standpoint. Even assuming all |
| those parties can trace the links they're involved in, we have to go |
| through a different process, and probably a different law enforcement |
| agency, for every single one. |
|
|
| "In the old days out here, the Texas rangers were very famous for catching |
| bank robbers. They didn't stop at the Texas border when chasing a killer. |
| They'd jump on their horse and, even if they crossed the state line, they |
| would follow wherever the chase lead them. In the computer age we can't do |
| that at all. What we have now in the US is a mish-mash of laws and |
| agencies. Multiply that on the international level and it's completely out |
| of hand." |
|
|
| High-tech law enforcement |
|
|
| Thackeray moved to Arizona in 1986 after beginning her career as a |
| prosecutor in Philadelphia. She worked in the attorney general's office |
| running an organised crime and racketeering unit that won a national |
| reputation for its technical ability in the fight against hackers. She was |
| also the mastermind behind Operation Sundevil (see panel, overleaf), the |
| first nationally coordinated raid on hackers. But then democracy took a |
| turn and she became a victim of the strange process by which Americans |
| elect their most senior law officers. Her boss lost the race to be elected |
| attorney general. The victor wasn't interested in technology so 12 people |
| got sacked, including Thackeray. |
|
|
| Taking a break from the slide show for a moment, she shows me a little |
| number-generating program stored on her laptop. It generates random |
| numbers for Visa cards. Give it the four-digit code that identifies a card |
| issuer and within minutes you'll have hundreds of false credit card |
| numbers to play with. "Now supposing you had another little program that |
| made the bank think these numbers were legitimate - How much do you think |
| you could make?" We go on-line to see some of the hacker sites. Thackeray |
| believes that the Web is making a bigger range of crimes much easier to |
| commit. "In the future the good parts of the Internet will be bigger and |
| more complex and available to more people and that's great. But this means |
| all of those people will have victim potential. Thanks to the growth of |
| the Web, one criminal can now do an unprecedented amount of damage, |
| whether it's to corporations or to individual's feelings by threatening |
| and stalking, spam attacks or just shutting down ISPs. |
|
|
| "We have had four incidents in the first six months of this year. These |
| people are attacking not just the little local service provider, but also |
| some of the 19 Internet backbone carriers. They're absolutely ruthless and |
| don't care who they hurt. In a case in Tucson, tens of thousands of users |
| were shut down just because some person with an adolescent level of |
| maturity decided he was mad at another ISP, so he took all of its |
| customers off-line. It's frighteningly easy to do and only took one |
| broadcast message. All the routers that run the Internet shake hands |
| periodically, so if you can infect one router, given time it will infect |
| the entire world. And that's what happened. It took just a few days for |
| the entire world to believe that this service provider, and all its |
| customers, didn't exist." Not only is the Web host to a whole new range |
| of crimes, it's also home to a brand new band of weirdos. "Unfortunately |
| the Web is the best playground ever invented for sociopaths. They can |
| hide, are anonymous and can't be traced. Nobody is in charge and it gives |
| them that power rush that psychologists say is what they live off. It's |
| their whole life's breath. It's the chest-beating power surge of being |
| able to do it and get away with it. We are just seeing more acts of wanton |
| destruction simply for the sake of showing that you can do it." |
|
|
| Does she think this new generation of Web hackers is a real threat to |
| people? "Every baby in America knows the 911 emergency system. If mommy's |
| drowning in the pool, we've had three-year- olds save her life by dialling |
| 911. The hackers have attacked the 911 system and they're still doing it. |
| That's not for knowledge or for glory, that's just an act of vicious ego." |
|
|
| Rat's nests and technocrap |
|
|
| Personal liberty is taken very seriously in the western United States. |
| No-one likes the idea of "big government" interfering with people's lives. |
| Even hackers gain sympathy when they complain of harassment by police and |
| prosecutors. Some say they've been victimised by the authorities. |
|
|
| Thackeray denies this. "It's a hacker myth that we take away their |
| computers and sit on them forever. In one case we came across, the guy had |
| over 12Gb of data stored on his system - that's equivalent to 15,000 |
| paperback books. It's better that we seize all that material - you might |
| have love letters, cook book recipes and your extortion kidnapping letter |
| on the same disk. We can't take one without taking the other. We cannot |
| physically copy that volume. It is far easier for us to take computers |
| away than for us to camp out in your house for six months." |
|
|
| A hovel of a bedroom fills the projector screen. Coke cans everywhere, |
| rubbish dotted across an unmade bed. In the corner sits a naked computer, |
| stripped of casing, wires exposed. Thackeray calls it a rat's nest. She |
| has hundreds of similar photos. "Back in Philadelphia I began collecting |
| pictures of computers with their wires hanging out. When the geeks speak |
| to a jury we call the language they use technocrap. What you have here is |
| the physical version of technocrap." She gestures at the screen. Typically |
| hackers will set up a stereo system within easy reach of the computer, and |
| often a drinks cabinet as well. |
|
|
| A recent innovation is the home network. "We've come up against four or |
| five houses recently where people have had multiple systems networked in |
| the house. And that's even without running a bulletin board. When we get |
| lucky and we're fast enough we can find the guilty computer - but the |
| hardest part of the job is finding the brain behind the computer. To find |
| that person is good old- fashioned low-tech police work." |
|
|
| Thackeray's team face another new problem caused by the huge increase in |
| storage capacity. "In the computer situation no one throws anything out. |
| That makes our life more difficult. We don't want to read the last five |
| year's worth of your e-mail, life's too short and frankly it's not that |
| interesting. But sometimes we're searching for one piece of evidence and |
| it's buried in a huge volume of stuff so what else can we do?" |
|
|
| Tracking or trailing? |
|
|
| The slide show draws to an end. We amble downstairs to the office of |
| another investigator. He shows us an array of hacker memorabilia on his |
| computer. I ask Gail about the future. She believes that unless there's a |
| fundamental change in the way police forces treat computer crime, there is |
| no hope at all. "The police departments and prosecutors around the country |
| are, frankly, paramilitary organisations with very bureaucratic, layered |
| decision- making processes. They see the need for more training in gangs; |
| they don't see the need for more training in computers because the |
| management came out of the knife and gun club. |
|
|
| "Police management is dominated by the physical crimes people. We've got |
| to dissolve some of these barriers. When we move we need to move fast like |
| the Texas rangers - both legally and bureaucratically we're just not there |
| yet. When I started 20 years ago law enforcement was behind the computer |
| crime wave. We're farther behind today than we were then." |
|
|
| Matt McGrath is an investigative journalist who works for Radio 5. |
|
|
| 0x4>------------------------------------------------------------------------- |
|
|
| Title: Justice Department to Hire Computer Hackers |
| Source: Business Week |
| Date: Aug. 6, 1998 |
|
|
| Wanted: Hackers to break into the Justice Dept. computer network. Under a |
| program known as Operation Get Cracking, the Justice Dept. sought members |
| of the computer underground at late July's Def Con hackers' conference in |
| Las Vegas, BUSINESS WEEK reports in its August 17 issue. Attorney General |
| Janet Reno has quietly committed $1 million to hire up to 16 hackers to |
| test the Department's networks, says a source at Justice, which would |
| neither confirm nor deny the operation. |
|
|
| [Uh... huh... I won't go there.] |
|
|
| 0x5>------------------------------------------------------------------------- |
|
|
| Title: A Cracker-Proofing Guarantee |
| Source: Wired News Report |
| Date: 9:05 a.m. 5.Oct.98.PDT |
|
|
| CIGNA Secure Systems Insurance is offering a US$25 million liability |
| policy designed to cover losses resulting from attacks by computer |
| crackers, the company said Monday. |
|
|
| To qualify for coverage, a client must secure its systems or pass |
| inspection from a CIGNA-approved security-management company. Otherwise, |
| potential clients are encouraged to contract with security-management |
| company NetSolve, in conjunction with Cisco's NetRanger |
| intrusion-detection software, which is pre-approved by CIGNA. |
|
|
| CIGNA Secure Systems Insurance provides coverage for theft of money, |
| securities, and property; for damage done by crackers to a firm's data or |
| software; and for business losses caused by attacks on a company's |
| computer systems. |
|
|
| [And how do they put value on your information? Who audits the system |
| to make sure you are telling the truth about your policy?] |
|
|
| A recent survey by the Computer Security Institute and the FBI found a 36 |
| percent increase from the previous year in losses stemming from |
| computer-security breaches. However, traditional property and liability |
| insurance policies do not address these risks, according to CIGNA. |
|
|
| "It's a nice marketing ploy," said computer security consultant Pete |
| Shiply. "But if someone is concentrating on breaking into a site, |
| eventually they will get in. There is no such thing as a secure site; |
| security is economics, it's a question of money and how much you want to |
| invest." |
|
|
| Asked what kind of intrusion might lead to a $25 million claim, Shiply was |
| skeptical. |
|
|
| "While I haven't read the agreements, I am pretty sure you would not get |
| that much," he said. "You would have to prove losses approaching that |
| figure, and that will likely be a difficult thing to do." |
|
|
| 0x6>------------------------------------------------------------------------- |
|
|
| Title: First-Ever Insurance Against Hackers |
| Source: Reuters |
| Date: 14-JUN-98 |
| By: Therese Poletti |
|
|
| A computer security firm is so certain of its security prowess that it is |
| offering to protect its customers with the first-ever hacker insurance, in |
| the event a customer is successfully invaded by hackers. |
|
|
| [So secure, hackers dumped logs of one of the ICSA's machines being |
| hacked to several IRC channels. Do as we say, not as we do.] |
|
|
| ICSA Inc., the International Computer Security Association, is now |
| offering as part of its TruSecure service, insurance against hacker |
| attacks. ISCA will pay up to $250,000 if a customer's network is hacked |
| into, after it has followed the TruSecure criteria. |
|
|
| ``This is the first hacker-related insurance,'' said Peter Tibbett, |
| president of the ICSA, based in Carlisle, Penn. ``It puts our money where |
| our mouth is.'' |
|
|
| ICSA sells its TruSecure service for $40,000 a year. The service, which it |
| has been offering for several years, is a series of steps, methods and |
| procedures that an ICSA client must adhere to. Some steps are simple, |
| common sense procedures, such as having the server which hosts your |
| company's Web site inside a locked room. |
|
|
| [You pay 40,000 a year, for up to 250,000 insurance. Pretty high |
| premium. 40,000 will buy you a lot of security consulting and additional |
| security precautions.] |
|
|
| Other steps are more complicated, such as the requirement to have a secure |
| firewall around an internal network. |
|
|
| But the ICSA does not sell products. Instead, it recommends a whole range |
| of software that it has approved as secure and meets its standards, |
| through open meetings and debates, with all its members, many of whom |
| develop security products. |
|
|
| Then, ICSA tests a client's security by using typical hacker methods, |
| through its 100 or so employees, none of whom are reformed hackers. ICSA |
| believes, along with executives at International Business Machines Corp. |
| who perform ``ethical'' hacking on its customers, that there is no such |
| thing as a reformed hacker. |
|
|
| ``We spray them with hacker tools and see where their vulnerabilities |
| are,'' Tibbett said, referring to many of the widely-used hacker programs |
| that are available over the Internet or shared among hackers. ``The |
| average site took about two weeks to get to the place where they meet all |
| our requirements.'' |
|
|
| After ICSA completes a six-step process to test and improve a company's |
| security, the customer is deemed secure and will then receive insurance. |
|
|
| The ICSA said it will pay its customers if they fall prey to a hacker, |
| even if they are not financially harmed from the attack. |
|
|
| ``Whether you lose money or not, we will pay,'' Tibbett said. ''We believe |
| that we reduce the risk dramatically ... Yes, we expect to write some |
| checks, but we don't expect to write very many.'' |
|
|
| Tibbett likens the ICSA to the Center for Disease Control, because it |
| tracks all hacker attacks and tests every hacker tool and virus its |
| progammers can find. The ICSA also is known for its emergency response |
| center, which tracks the fallout from known computer viruses and helps |
| companies in a crisis. |
|
|
| ``Good enough is never going to be perfect,'' Tibbett said. ''But we have |
| a motivation to improve our service. If we have to write a check when |
| someone gets hacked, it gives us another emphasis.'' |
|
|
| The company said it is partnering with major nationwide insurance carriers |
| who recognize the ICSA TruSecure certification as a requirement for hacker |
| policies. |
|
|
| 0x7>------------------------------------------------------------------------- |
|
|
| Title: New Unit to Combat High-Tech Crime |
| By: Yomiuri Shimbun |
| Date: June 05, 1998 |
|
|
| The National Police Agency plans to create a special "cyberpolice" unit to |
| combat the rise in high-tech crimes involving the Internet and other new |
| technologies, the agency said Wednesday in announcing its new high-tech |
| crime program. Information will be exchanged with its investigative |
| counterparts overseas on a 24-hour-a-day basis, it said. The program will |
| include special high-tech crime squads at the prefectural level, and |
| information security advisers at prefectural police stations who will |
| liaise directly with the private sector, with which the NPA wants to |
| coordinate its efforts. The agency will also request a budget for a |
| "hacker-proof" supercomputer next fiscal year. |
|
|
| The NPA recorded 263 high-tech crimes last year-eight times more than in |
| 1992. High-tech crime was on the agenda of the Group of Eight summit |
| meeting in Britain last month, where the eight leaders agreed to report on |
| their efforts to combat high-tech crime at the G-8 summit in Cologne, |
| Germany, next year. The NPA said Japan's current laws are inadequate and |
| it would push to have new laws enacted to limit access to computers by |
| those with criminal intent. |
|
|
| 0x8>------------------------------------------------------------------------- |
|
|
| Title: First 'Cyber Warrior' Unit is Poised for Operational Status |
| By: Bryan Bender |
| Date: June 17 1998 |
|
|
| The US Department of Defense (DoD) plans to stand up its first operational |
| unit of `cyber warriors' by September to safeguard against and respond to |
| computer attacks aimed at the US military, according to defence officials. |
|
|
| The Joint Chiefs of Staff (JCS) is assessing several proposals for a |
| Computer Defense Joint Task Force and JCS chairman Gen Henry Shelton is |
| expected to make a recommendation to Defense Secretary William Cohen, who |
| will have direct authority over the organisation, in the near future. |
|
|
| The JCS has a computer attack response cell within its directorate of |
| operations, but it "has not been codified as a warfighting entity," said |
| JCS spokesman Lt Cdr Jim Brooks. |
|
|
| The task force, which will conduct defensive rather than offensive |
| information operations, will have the necessary authority to take action |
| in the event of information attacks. Officials are determining how the |
| unit should be structured, where it should be and how much it will cost. |
|
|
| They say that the new unit will have to have a high level of co-ordination |
| with other federal agencies, particularly the Federal Bureau of |
| Investigation, given the constitutional limitations placed on the US armed |
| forces in the area of law enforcement. |
|
|
| JCS sources add that the task force is only expected to be an interim |
| solution to the rising need for a specialised unit to counter incidents of |
| cyber warfare. A permanent unit, possibly under the authority of one of |
| the US warfighting commanders-in-chief, is planned for the future. |
|
|
| The Pentagon has seen a steep rise in computer attacks and other attempts |
| either to access or contaminate DoD information networks. Art Money, the |
| DoD's senior civilian overseeing computer operations, said on 10 June that |
| the Pentagon experiences an average of 60 cyber attacks per week. |
|
|
| The US Department of Defense (DoD) plans to stand up its first operational |
| unit of `cyber warriors' by September to safeguard against and respond to |
| computer attacks aimed at the US military, according to defence officials. |
|
|
| The Joint Chiefs of Staff (JCS) is assessing several proposals for a |
| Computer Defense Joint Task Force and JCS chairman Gen Henry Shelton is |
| expected to make a recommendation to Defense Secretary William Cohen, who |
| will have direct authority over the organisation, in the near future. |
|
|
| The JCS has a computer attack response cell within its directorate of |
| operations, but it "has not been codified as a warfighting entity," said |
| JCS spokesman Lt Cdr Jim Brooks. |
|
|
| The task force, which will conduct defensive rather than offensive |
| information operations, will have the necessary authority to take action |
| in the event of information attacks. Officials are determining how the |
| unit should be structured, where it should be and how much it will cost. |
|
|
| They say that the new unit will have to have a high level of co-ordination |
| with other federal agencies, particularly the Federal Bureau of |
| Investigation, given the constitutional limitations placed on the US armed |
| forces in the area of law enforcement. |
|
|
| JCS sources add that the task force is only expected to be an interim |
| solution to the rising need for a specialised unit to counter incidents of |
| cyber warfare. A permanent unit, possibly under the authority of one of |
| the US warfighting commanders-in-chief, is planned for the future. |
|
|
| The Pentagon has seen a steep rise in computer attacks and other attempts |
| either to access or contaminate DoD information networks. Art Money, the |
| DoD's senior civilian overseeing computer operations, said on 10 June that |
| the Pentagon experiences an average of 60 cyber attacks per week. |
|
|
| 0x9>------------------------------------------------------------------------- |
|
|
| Title: Tracking Global Cybercrime |
| By: Claudia Graziano |
| Date: 4:00 a.m. 25.Sep.98.PDT |
|
|
| The International Chamber of Commerce said Thursday that it will open a |
| new division to help companies around the world protect themselves against |
| cybercrime. |
|
|
| "Basically, any scams you can do terrestrially you can do even easier in |
| cyberspace," said Eric Ellen, the chamber's executive director, who will |
| take the reins of the new division. |
|
|
| [Oooh.. 'terrestrially'.. three point word.] |
|
|
| The London-based unit will work with Interpol to fight heavy-duty |
| technological thievery -- such as money laundering, industrial espionage, |
| and investment fraud -- as opposed to small-time consumer scams like |
| selling nonexistent goods online. |
|
|
| Interpol chief Ray Kendall said the international police agency had been |
| pushing for years for such an alliance with the private sector since it |
| could move more quickly than governments in purchasing the equipment |
| needed to investigate high-tech crime. |
|
|
| The cybercrime unit will provide the 7,000 International Chamber of |
| Commerce members with information about how and where the myriad types of |
| crimes are committed on the Net and what businesses can do to protect |
| themselves against crackers and fraud artists. |
|
|
| A Federal Trade Commission official praised the commission's efforts to |
| raise domestic awareness of Internet fraud. |
|
|
| "We welcome any international effort to crack down on cyberfraud, because |
| crime and fraud perpetrated against consumers or businesses only |
| undermines the electronic marketplace and stifles the great opportunities |
| available through Internet commerce," said Paul Luehr, an assistant |
| director at the commission. |
|
|
| The chamber said it hopes to persuade governments, including the United |
| States, to wipe out restrictions that limit the spread and availability of |
| strong encryption algorithms. |
|
|
| That position flies in the face of US law enforcement, which currently |
| limits the export of powerful crypto on the grounds that it might be used |
| by terrorists. Meanwhile, US crypto advocates have long said that ciphers |
| are better suited to fighting crime than hiding it. |
|
|
| "There will be some lobbying on our part, but many businesses can't wait |
| for laws," Ellen said. "Crimes cross international borders, yet existing |
| laws [against cybercrime] are national." |
|
|
| The chamber's cybercrime unit will meet regularly with Interpol in Lyon, |
| France, to exchange information and intelligence on cybercrime and its |
| perpetrators. |
|
|
| Additionally, the chamber division plans to exchange information with the |
| FBI's National Infrastructure Protection Center and the FBI's National |
| Security Awareness unit, which looks after the interests of US businesses. |
|
|
| Headquartered in Paris, the International Chamber of Commerce establishes |
| rules that govern the conduct of businesses worldwide. The nonprofit group |
| holds top-level consultative status with the United Nations, where it puts |
| forward the views of business in countries around the world. |
|
|
| 0xa>------------------------------------------------------------------------- |
|
|
| Title: FBI Opens High-Tech Crisis Center |
| By: Michael J. Sniffen |
| Date: Friday, November 20, 1998; 9:29 a.m. EST |
|
|
| Entering its 91st year with new duties that extend around the world, the |
| FBI today opened a high-tech, $20 million operations center nearly the |
| size of a football field to allow headquarters to manage up to five crises |
| at once. |
|
|
| The new Strategic Information and Operations Center -- called ``sigh-ock'' |
| after its initials -- has 35 separate rooms that can seat up 450 people |
| total and covers 40,000 square feet on the fifth floor of FBI headquarters |
| on Pennsylvania Avenue. It is 10 times bigger than its two-decade-old |
| predecessor that could, with difficulty, handle two crises simultaneously. |
|
|
| Bureau officials became convinced the old SIOC was outmoded in the summer |
| of 1996 when they tried to manage investigations of the Olympic bombing in |
| Atlanta, the explosion of TWA 800 and the Khobar Towers truck-bombing in |
| Saudi Arabia at the same time. |
|
|
| ``There weren't enough rooms or enough telephones,'' FBI Director Louis J. |
| Freeh said. ``We had people working at desks in the hallway outside and |
| reading top secret material in the vending area across the hall.'' |
|
|
| The supersecret facility with no windows to the street, or even any |
| outside walls, has a private ribbon-cutting today with former President |
| George Bush as the FBI celebrates its 90th birthday. |
|
|
| Introducing the new SIOC to reporters for a one-time-only tour, Freeh said |
| it was emblematic of the bureau's expanded responsibilities and |
| technology. |
|
|
| He noted that the bureau's fastest growing component, its Counterterrorism |
| Center, is arrayed in the offices around the SIOC -- as is its violent |
| crime unit, which handles domestic attacks such as the Oklahoma City |
| bombing or hijackings. |
|
|
| Much of the counterterrorism work now extends overseas, to Saudi Arabia |
| where U.S. soldiers have been killed in two bombings and East Africa |
| where two U.S. embassies were bombed, for example. In the last five years, |
| Freeh said, the FBI has nearly doubled its legal attaches working abroad |
| -- to 32 cities now. Eight more are to open soon -- in Almaty, Kazakhstan; |
| Ankara, Turkey; Brasilia, Brazil; Copenhagen, Denmark; Prague, Czech |
| Republic; Santo Domingo, Dominican Republic; Singapore and Seoul, Korea. |
|
|
| The computers at desks throughout the center and the 5-by-15-foot video |
| screens on the walls of almost every room can display not only U.S. |
| television broadcasts but also local TV channels from foreign countries. |
| The bank of red-lettered digital clocks in each room can display the local |
| time in five or six locations. |
|
|
| The FBI's new National Infrastructure Protection Center, tasked to prevent |
| and respond to attacks on government or private computer systems that keep |
| America running, will have three representatives on each of the 10-member |
| watch teams that staff the center at all times. Also present around the |
| clock: a representative of the National Security Agency's Cryptologic |
| Security Group to provide information from the government's worldwide |
| electronic eavesdropping. |
|
|
| Behind a series of blond wood doors, the complex warren of workrooms, many |
| of which can be combined or divided as need requires, have light gray |
| carpets, paler gray walls and dark gray metal desks with white plastic |
| tops. The desks are fixed in place only in two control rooms that manage |
| the flow of information to each room; elsewhere they are modular and can |
| be rearranged at will over floor-mounted electric and telephone plugs. |
| Interior windows allow views into conference rooms or the SIOC's hallways. |
|
|
| Ron Wilcox, deputy chief of the SIOC, said the compartmented areas would |
| allow bureau agents ``to work in one room with District of Columbia police |
| on a local kidnapping while another room works on a terrorist bombing with |
| top secret data.'' |
|
|
| Each work station can receive data from three sets of phone and computer |
| links: unclassified, secret and top secret-sensitive compartmented |
| information. |
|
|
| While the center will draw information from around the world, information |
| will not leave without permission. The center is shielded to prevent |
| outside detection of electronic emissions, so cell phones do not work |
| inside it. |
|
|
| In Operations Group D and G, the largest room with capacity for 118 |
| people, there are printers with yard-wide rolls of paper to print out city |
| maps. So the room will not be overcome with noise, the sound from video |
| screens is broadcast silently from black boxes around the room to |
| headphone sets available to each worker. |
|
|
| The chairs, most on wheels, have arm rests. They are blue-green cloth in |
| the workrooms; gray leather in the Executive Briefing Room, the center's |
| second largest room, with three blond wood semicircles seating 36 and |
| fixed theater seats at the back for 50 more. |
|
|
| Rather than increasing the burden on field agents to report to Washington, |
| Wilcox said the new center should reduce such demands, because ``we will |
| offer one-stop shopping for headquarters. Field agents can report to us, |
| and we will be responsible for making sure everybody is alerted who should |
| be.'' |
|
|
| 0xb>------------------------------------------------------------------------- |
|
|
| Title: Navy fights new hack method |
| By: Tim Clark |
| Source: CNET NEWS.COM |
|
|
| Hackers are banding together across the globe to mount low-visibility |
| attacks in an effort to sneak under the radar of security specialists and |
| intrusion detection software, a U.S. Navy network security team said |
| today. |
|
|
| Coordinated attacks from up to 15 different locations on several |
| continents have been detected, and Navy experts believe that the attackers |
| garner information by probing Navy Web sites and then share it among |
| themselves. |
|
|
| "These new patterns are really hard to decipher--you need expert forensics |
| to get the smoking gun," said Stephen Northcutt, head of the Shadow |
| intrusion detection team at the Naval Surface Warfare Center. "To know |
| what's really happening will require law enforcement to get hold of the |
| hackers' code so we can disassemble it." |
|
|
| The new method involves sending as few as two suspicious probes per hour |
| to a host computer, a level of interest that usually won't be detected by |
| standard countermeasures. But by pooling information learned from those |
| probes, hackers can garner considerable knowledge about a site. |
|
|
| 0xc>------------------------------------------------------------------------- |
|
|
| Title: Pentagon Blocks DoS Attack |
| Source: Newsbytes via NewsEdge |
|
|
| The Pentagon launched an attack applet of its own this month to thwart a |
| denial-of-service attack against its DefenseLink Web site at |
| http://www.defenselink.mil . |
|
|
| DefenseLink was one of three sites targeted on Sept. 7 by a group that |
| calls itself the Electronic Disturbance Theater. The group claimed to be |
| acting in solidarity with Zapatista rebels in the Mexican state of Chiapas |
| to protest Defense Department funding of the School of the Americas. |
|
|
| Other target Web sites belonged to Germany's Frankfurt Stock Exchange and |
| Mexican President Ernesto Zedillo. |
|
|
| The theater group's Web site referred to the attacks as a virtual sit- in. |
| Visitors to the group's site received a hostile Java applet designed to |
| keep reloading the DefenseLink and other Web sites automatically as long |
| as the the visitors' browsers were open. |
|
|
| Multiple simultaneous reload requests can overwhelm a server, but the |
| attacks apparently had little impact, DOD officials said. |
|
|
| "Our support staff certainly was aware of the planned attack," Pentagon |
| spokeswoman Susan Hansen said. "They took preventive measures to thwart |
| the attack so that DefenseLink was available." |
|
|
| Hansen would not specify the preventive measures, but the theater group |
| reported, and a DOD official confirmed, that the Pentagon aimed its own |
| hostile applet back at the attackers. |
|
|
| Browsers "got back a message saying the (theater group's) server wasn't |
| available," Hansen said. |
|
|
| The Frankfurt exchange reported the reload requests had little or no |
| impact on its server, either. |
|
|
| The theater group has promised a second round of attacks, known as |
| FloodNet, between Sept. 16, Mexican Independence Day, and Oct. 12, |
| Columbus Day. |
|
|
| Representatives of security software vendor Finjan Inc. of Santa Clara, |
| Calif., said the attacks marked the first time Java applets have been used |
| in a political protest, although the theater group has claimed |
| participation in other virtual sit-ins against Zedillo and President |
| Clinton since April. |
|
|
| The group is a throwback to the 1960s guerrilla theater of the Yippies, |
| who once hosted an attempt to mentally levitate the Pentagon. The theater |
| group's Web site at http://www.nyu.edu/projects/wray/ecd.html advocates |
| electronic civil disobedience. Its attempted Pentagon attack was part of |
| Swarm, a project launched at the Ars Electronic Festival on InfoWar in |
| Linz, Austria. |
|
|
| The group's announced activities, in addition to the unspecified attacks |
| planned through mid-October, include radio protests against the Federal |
| Communications Commission on Oct. 4 and 5. |
|
|
| The Swarm attacks reportedly did not meet with much approval among |
| hackers, who view FloodNet as an abuse of network resources. |
|
|
| 0xd>------------------------------------------------------------------------- |
|
|
| Title: Hackers Elude Accelerator Center Staff |
| Source: San Francisco Chronicle |
| Date: 06/11/98 |
|
|
| Officials at Stanford Linear Accelerator Center are rethinking the |
| openness of their computer system a week after hackers forced them to shut |
| down outside access to the federal research facility's computer network. |
|
|
| External access to the center's computer system was suspended after staff |
| members failed to catch hackers who had intercepted a password and were |
| moving in and out of more than 30 of the facility's Unix servers. |
|
|
| "We traced the hackers around to the point that we weren't gaining on |
| them," said center spokeswoman P.A. Moore. "The person or persons were |
| successful in covering their tracks and in getting into and out of |
| accounts." |
|
|
| It is still unclear how the hackers got access to a password and the |
| system, Moore said. |
|
|
| But as a result of the breach, she said, officials are rethinking the |
| center's policy of being an open scientific research facility. She said |
| proposals are being considered to restrict the center's computer system. |
|
|
| "A number of options are being considered and they range from very mild to |
| more severe," she said. |
|
|
| Moore said that most of the center's Internet services were restored |
| Tuesday after security measures were put in place and that staff members |
| were instructed to change their passwords. |
|
|
| The shutdown did not create any serious problems, although it caused |
| delays in many projects and denied researchers from all over the world |
| access to the center's Web site, Moore said. |
|
|
| Established in 1962, the Linear Accelerator Center is funded by the |
| Department of Energy and operated by Stanford University. With a staff of |
| about 1,300 and 2,000 researchers worldwide, the center conducts basic |
| research on atomic and subatomic physics. The center's researchers use |
| colliders to study matter at the atomic level. "Mostly, we've lost time |
| on experiments," Moore said. "We do not see that any data has been |
| compromised. It's more of a setback than a major disaster." |
|
|
| But she said future break-ins will remain a problem for open scientific |
| facility. The center does not conduct any classified research, she said. |
|
|
| "Computer hackers are very sophisticated in terms of their knowledge and |
| ease in traveling through cyberspace," she said. "We're vulnerable. By |
| being an open facility, we are a target for vandals." Stephen Hansen, a |
| Stanford University computer security officer, said campus system |
| break-ins average at least two a month. |
|
|
| A common tool used by hackers is a computer program dubbed "the sniffer," |
| which allows intruders to decode data in a system, specifically passwords |
| and log-on names. |
|
|
| "Sniffers are quite dangerous," Hansen said. "If they are not caught right |
| away, they can lead to break-ins to thousands of accounts, not just |
| locally, but across the Internet." |
|
|
| To minimize such break-ins, he said, more system operators are using |
| encryption programs that prevent hackers from determining sign-on names |
| and passwords. However, this is not an easy option for the Stanford center |
| because encryption programs are prohibited in some countries, including |
| France, where a number of center-affiliated researchers live. |
|
|
| 0xe>------------------------------------------------------------------------- |
|
|
| Title: Cyberattacks leave feds chasing 'vapor' |
| By: Bob Brewin (antenna@fcw.com) |
|
|
| Top administration officials last week warned that the United States lacks |
| the capability to quickly identify the nature and scope of a continuing |
| series of cyberattacks against both federal and private systems that |
| support the country's telecommunications, financial and energy critical |
| infrastructures. |
|
|
| During a series of congressional hearings and in speeches last week, |
| federal security and information technology officials made it clear that |
| they anticipate a powerful ''Achilles' heel'' cyberattack that could |
| cripple the nation's vital systems because the government lacks the |
| ability to defend against such an attack. |
|
|
| John Hamre, deputy secretary of Defense, told the House National Security |
| Committee that such a paralyzing cyberattack against critical |
| infrastructures is inevitable. "There will be an electronic attack |
| sometime in our future," he said. "Should an attack come, it will likely |
| not be aimed at just military targets but at civilian [targets] as well." |
| Administration officials also reported that the attacks continue unabated. |
|
|
| Art Money, who is slated to take over as assistant secretary of Defense |
| for command, control, communications and intelligence later this year, |
| said in a speech at a conference in Washington, D.C., last week that DOD |
| "averages 60 intrusions a week" into its computer systems. An official of |
| the FBI's new National Infrastructure Protection Center (NIPC) said the |
| office is investigating a "half dozen" incidents, describing them as |
| ''substantial.'' |
|
|
| But security agencies said the process of chasing down and identifying |
| attackers is frustrating, as in the case of the highly publicized series |
| of hacks against DOD computers last February. The FBI and numerous DOD |
| agencies worked together to track down the hackers, but the agencies could |
| not "identify [until] the following week" the source and type of attack, |
| Ellie Padgett, deputy chief of the National Security Agency, told the |
| Senate Judiciary Committee's Subcommittee on Technology, Terrorism and |
| Government Information. |
|
|
| Padgett said it would still take the agency a "matter of days" to |
| determine if an attack was strategic or just a teenage prank. |
|
|
| Michael Vatis, director of NIPC, told the committee, "In most |
| cyberattacks, it's impossible to know the identity of the penetrator," be |
| it teenage hackers, criminals or a strategic attack by a hostile nation. |
| Vatis, in an interview, likened chasing down hackers to "tracking vapor." |
|
|
| Barry Collin, a senior researcher with the Institute for Security and |
| Intelligence, said it will become increasingly difficult to identify |
| strategic attacks because a nation that is sophisticated enough to mount a |
| cyberwar against the United States also will have the sophistication to |
| disguise that effort as a hacker attack mounted by teenagers. "They can |
| make it appear as if it is a game instead of a real attack," he said. |
|
|
| A "Predatory Phase" |
|
|
| Also frustrating security experts is the possibility that attacks will be |
| carried out in quick hits over a long period of time, Hamre said. "The |
| predatory phase could take place over several years, making it hard to |
| collate curious, seemingly unrelated events into a coherent picture," he |
| said. These long-term attacks "could take place over multiple |
| jurisdictions - [for example] power grids or air traffic control nodes in |
| various states. Our knowledge of the origin of such attacks and their |
| sponsorship is likely to be imprecise." |
|
|
| Hamre also presented classified testimony to a joint closed hearing of the |
| House National Security Committee's Military Procurement and the Military |
| Research and Development subcommittees. Hamre may have presented more |
| detailed evidence of computer vulnerabilities, based on remarks by Rep. |
| Curt Weldon (R.-Pa.), chairman of the Military Research and Development |
| Subcommittee, who called Hamre's classified testimony "the most |
| provocative briefing" he had ever received during his 12 years in |
| Congress. |
|
|
| The Clinton administration hopes to protect the critical infrastructures |
| with recently formed security organizations, including the National |
| Infrastructure Assurance Plan, the NSA Network Incident Analysis Cell and |
| the Critical Infrastructure Assurance Office in the Commerce Department. |
| CIAO will spearhead multiple-agency efforts to develop better policies, |
| processes, procedures and systems to detect and deter attacks. |
|
|
| The administration also plans to heavily involve the private sector - |
| banks, power companies and railroad companies - in "public/private |
| partnerships'' to protect the infrastructure. |
|
|
| Members of Congress on both sides of the Hill praised the administration's |
| initial efforts, but they also expressed some skepticism about the |
| approach. Sen. Diane Feinstein (D-Calif.) said she "wondered if the nexus |
| between the public and private sectors will work." |
|
|
| Rep. Herbert Bateman (R-Va.) said he is "deeply skeptical" about placing |
| the CIAO in Commerce rather than in DOD. |
|
|
| Bateman said Commerce's willingness to allow the exportation of critical |
| satellite and rocketry information to the Chinese left him "unconvinced" |
| that Commerce had the same "sensitivity" as the Pentagon has to the |
| requirements of national security. |
|
|
| 0xf>------------------------------------------------------------------------- |
|
|
| Title: Congress Attacks Cyber Defense Funds |
| Source: Defense News |
| Date: 6/16/98 |
|
|
| U.S. Congress Attacks Cyber Defense Funds By George I. Seffers Defense |
| News Staff Writer WASHINGTON-- Congress is taking millions of dollars from |
| the war chest intended to protect critical U.S. infrastructure from |
| potentially crippling cyber attacks, according to Defense Department and |
| White House sources. The House Appropriations Committee deleted the entire |
| $69.9 million the Defense Department had requested for infrastructure |
| protection in its 1999 budget. That funding should be restored, Linton |
| Wells, principal deputy for the assistant secretary of defense for |
| command, control, communications and intelligence, told lawmakers at a |
| June 11 hearing here on protecting national infrastructures-- |
| telecommunications, banking and finance, energy, transportation, and |
| essential government services-- from cyber attack. |
|
|
| [So they make all these new groups to fight cybercrime.. then |
| this?] |
|
|
| 0x10>------------------------------------------------------------------------ |
|
|
| Title: Mudge on Security Vendors |
| From: Bugtraq |
|
|
| In the SAFER bulletin they mention compromising software that was |
| explicitly installed as an additional security measure. |
|
|
| While joking around I was mentioning to some colleagues about the |
| attrocity of some (most) of the security related products out there right |
| now. Not in what they are claiming to accomplish but in the lack of sound |
| coding in their own products. I thought it was pretty much understood but |
| the amazed looks on their faces told me otherwise. So I figured I might |
| point this out in case that was not an isolated assumption that these |
| people had. Hopefuly I'm already preaching to the choir on Bugtraq. |
|
|
| [Note - though I explicitly mention ISS and Axent they are by no means any |
| worse or better than others not mentioned here... in addition I am |
| referring to older versions of their products. I have not spent time |
| looking at their most current releases to verify whether things have |
| improved or gotten worse. Please take this for what it is meant to be - a |
| general rant about the security vendor world as it stands... not an attack |
| against particular vendors] |
|
|
| A few real world cases: |
|
|
| A few revs back in ISS' commercial security scanner there were several |
| vulnerabilities. One particular company contracted me to come in and give |
| them a report on the level of competance that an auditing company they had |
| hired were at. |
|
|
| Sure enough, when the auditor scanned the box that we had setup they were |
| using ISS (version 3? my memory isn't serving me very well right now). |
| Upon an attempt to connect to tcp/79 (fingerd) we fed them back a bunch of |
| 'garbage' (well, you know... that garbage that is comprised of a long run |
| of NOPs followed by machine dependent opcodes and operands :). After a few |
| tries, root on the scanning machine was handed out as there were no checks |
| done on the data that was being retrieved (or more accurately assumptions |
| were being made about the length). |
|
|
| ... |
|
|
| Axent swore up and down that their ESM systems were communicating via DES |
| encrypted channels. In reality the communications were simply XOR'd and |
| they would send the progressive XOR key every X packets. The DES |
| components were slated for the 'next rev'. Doesn't matter - the point is |
| that they shouldn't have done the XOR scheme to begin with when the |
| purpose of the communications between the client and server are "lists" of |
| vulnerabilities on said machines. Not something you want advertised to |
| anyone passivle monitoring. |
|
|
| ... |
|
|
| I don't know how many "security" packages I've looked at that do |
| outrageously stupid things like chmod(777), popen(), or system() even! |
| Even if the program is running non-priveledged and is designed to be on a |
| system that does not have multiple users it is a demonstration that the |
| people writing the code to protect your systems (often at outrageous price |
| tags!) seem incapable of demonstrating sane coding techniques themselves. |
|
|
| How is one supposed to get 'warm fuzzies' that one is having their systems |
| "protected" when the products doing the protecting show no security |
| competence. |
|
|
| Vendors listen up! |
|
|
| .mudge |
|
|
| 0x11>------------------------------------------------------------------------ |
|
|
| Title: More delays for Mitnick trial |
| By: Kevin Poulsen |
| Date: November 25, 1998 3:33 PM PT |
| Source: ZDNet |
|
|
| Accusing government attorneys of stalling efforts to collect key documents |
| for his case, the defense attorney representing Kevin Mitnick, famed |
| criminal hacker, requested a continuance on Tuesday. According to Donald |
| Randolph's motion, the government missed a court-ordered deadline to |
| provide the defense with copies of prosecution witnesses statements. The |
| statements were finally handed over on Tuesday, almost a month late. |
|
|
| In addition, the prosecution is almost a week behind in handing over a |
| list of evidence to the defense. Some electronic evidence is being |
| withheld completely, claimed Randolph. |
|
|
| Prosecution delays |
|
|
| "Due to the government's significant delay in producing discovery as |
| ordered by this court, and due to its continuing failure to produce |
| certain discoverable evidence altogether, the defense cannot competently |
| complete its investigations and prepare for trial in this matter absent a |
| reasonable continuance in the trial date," stated the motion. |
|
|
| The original trial was scheduled for Jan. 19, 1999. |
|
|
| The prosecutors attacked any delay. "The contention that we have been late |
| with materials is disingenuous," says prosecutor David Schindler. "We've |
| provided thousands of pages of discovery." |
|
|
| Government mole? |
|
|
| The text of the motion also implied that the government had paid a |
| one-time Mitnick cohort and employee of Mitnick's previous attorney, Ron |
| Austin, to spy on his client. |
|
|
| "Austin was privy to confidential communications between Mr. Mitnick and |
| Mr. Sherman which he later disclosed to the government," said the |
| statement. |
|
|
| 0x12>------------------------------------------------------------------------ |
|
|
| Title: 'Back door' doesn't get very far |
| Source: San Jose Mercury News |
|
|
| A U.S. government panel has failed in a two-year effort to design a |
| federal computer security system that includes ''back doors,'' a feature |
| that would enable snooping by law enforcement agencies, people familiar |
| with the effort said this week. The failure casts further doubt on the |
| Clinton administration policy -- required for government agencies and |
| strongly encouraged for the private sector -- of including such back doors |
| in computer encryption technology used to protect computer data and |
| communications, according to outside experts. |
|
|
| But administration officials said the panel, which is set to expire in |
| July, simply needed more time. The 22-member panel appointed by the |
| secretary of commerce in 1996 concluded at a meeting last week that it |
| could not overcome the technical hurdles involved in creating a |
| large-scale infrastructure that would meet the needs of law enforcers, |
| panel members said. The group was tapped to write a formal government plan |
| known as a ''Federal Information Processing Standard,'' or FIPS, detailing |
| how government agencies should build systems including back doors. |
|
|
| 0x13>------------------------------------------------------------------------ |
|
|
| Title: ICSA Goon Pretends to be a Hacker [my title] |
| Source: Forbes Digital Tool |
| By: Adam Penenberg |
|
|
| J3 spends his days trolling around the hacker underground, monitoring |
| hacker channels on Internet Relay Chat, checking out the latest on |
| "phreaking,"--cracking the phone system-- dialing up bulletin boards and |
| checking out web sites that offer password-cracking software and how-to |
| guides. |
| |
| For J3 this isn't just a hobby, it's a job. |
| |
| ICSA, a computer security firm, hired J3 (not his real name nor his online |
| "nick", since his success depends on total anonymity) two years ago as the |
| company's lead underground analyst. His mission: to keep tabs on the |
| latest trends and tools in the hacker world. When he gets wind of a new |
| security hole, he passes the information on to ICSA's tech staff so that |
| the company can either develop a defense or tip off software makers before |
| the flaw can be exploited. |
|
|
| J3 is very busy. Recently, a group of European hackers released a Trojan |
| horse-like program that would enable them to set up backdoors in geeky |
| programs known only to network administrators, such as "named" programs |
| related to domain name servers, a basic component of any network connected |
| to the larger Internet. J3 found out about it in the course of his |
| monitoring, passed it on to ICSA, and the company informed CERT (Computer |
| Emergency Response Team) which posted an advisory. |
|
|
| The Internet is a lot like Lord of the Flies, a nasty, violent --yet |
| virtual--world where the strong intimidate the weak. |
|
|
| He was also instrumental in helping ICSA detect two types of denial of |
| service attack modes--Teardrop and Land--that were being used to exploit |
| vulnerabilities in the TCP/IP protocol. These new attacks took advantage |
| of tweaks that would beat existing patches, which made it difficult for |
| system administrators to stay ahead of hackers. But J3, because of his |
| links to the underground, was able to learn of these exploits shortly |
| after they were posted on hacker channels. |
|
|
| "I'm proud of a lot of the work we do," J3 says. "I've found a company's |
| entire password file posted to a web site, or that hackers have root in a |
| network or that a merchant site with a database of credit cards has been |
| compromised. I then contact the companies and warn them." |
|
|
| He says that the Internet is a lot like Lord of the Flies, a nasty, |
| violent--yet virtual--world where the strong intimidate the weak. Not all |
| hackers are destructive, of course. There are many good ones on a quest |
| for pure information, the lifeblood of their avocation, who post security |
| flaws because they believe it's the best way to fix them. It's the ones |
| who exploit these flaws to cause damage that irritate J3. |
|
|
| But they have a vulnerability: their need for self-aggrandizement, which |
| is key to J3's success. "If hackers didn't brag," he says, "I wouldn't |
| have a job." |
| |
| J3, who works mostly nights since the Internet never sleeps, isn't just a |
| full-time worker. He's also a graduate student working on his Ph.D. in |
| psychology. And his area of study? |
| |
| Hackers, of course. |
|
|
| 0x14>------------------------------------------------------------------------ |
|
|
| Title: Is Your kid a Hacker |
| Source: Family PC Magazine |
| Date: November 1998 |
| By: Kevin Poulsen |
|
|
| If you suspect your kid is a computer hacker, here's some advice from a |
| convicted hacker on how to handle it |
|
|
| It starts with a knock on the door. A dozen men in suits and shoulder |
| holsters are outside, their Buicks and Broncos crammed into your driveway |
| and parked along the street. Over their shoulders you can see your |
| bathrobe-clad neighbors watching the spectacle from their lawns. It might |
| be the FBI, it may be the Secret Service, but whoever it is, the humorless |
| agents hand you a piece of paper and head toward your son or daughter's |
| room. You wonder, perhaps for the first time, what your kid has been |
| doing in there with the computer. |
|
|
| If you're a parent, you probably regard the Internet as a font of both |
| promise and peril for your children. It can be an invaluable learning |
| tool and a way to encourage your kids to develop the basic computer skills |
| they'll eventually need. But what if they take to it a little too eagerly |
| and enthusiastically and begin using it to get into places where they |
| don't belong? In that case, normal youthful rebellion, or simple |
| inquisitiveness, if it's expressed over the Internet, could turn your |
| family upside down. |
|
|
| It happened last February in Cloverdale, California, when surprised |
| parents found out their teenage son was suspected in a series of Pentagon |
| intrusions. It happened again in Massachusetts a week later, when the |
| Justice Department won its first juvenile conviction under the Federal |
| Computer Fraud and Abuse Act. |
|
|
| It happened to my family 15 years ago, in one of the first hacker raids in |
| the country. At that time, I was the teenage miscreant who was illegally |
| accessing federal computers. Now, in my early thirties, I've begun to |
| wonder how I would protect a kid of my own from becoming a poster child |
| for computer crime. I believe the best approach is to stay informed and |
| to communicate with your potential cyberpunks. |
|
|
| Open Communication Channels |
|
|
| Some of the things you might view as ominous warning signs are actually |
| quite harmless. For example, if your teenager calls himself a "hacker," |
| he may not be headed for trouble. Despite the media's breathless |
| exhortation, hackers are not lawbreakers by definition. The word actually |
| describes someone with a talent for technology, a deep interest in how |
| things work, and a tendency to reject any limitations. If your son |
| disassembled the Giga Pet you gave him for Christmas, he's probably a |
| hacker. If he made it run better, he definitely is. Of course, some |
| hackers go further and test their skills against the adult world of |
| corporate and governmental computer systems. |
|
|
| If I thought my kids were cracking computers, I would want to put a stop |
| to it -- though not because it's the crime of the century. True hackers |
| live by an ethical code that precludes damaging systems or profiting from |
| their intrusions. There are worse values for a teenager to have. But |
| regardless of motives, a hacker who's caught in the act today is likely to |
| be treated as an industrial spy or a national security threat. A single |
| moment of rebellious exploration could land a teenager an early felony |
| conviction. |
|
|
| If you suspect that your kid may be crossing the line, there are various |
| software packages on the market that will allow you to monitor or control |
| his or her access to the Internet. Don't even think about using one. If |
| your teen really is a hacker, your technological solution will be a source |
| of amusement and derision, as well as an insult to his talents. Instead of |
| putting up barriers, I suggest you talk to your kids. |
|
|
| If your kid is reading underground Web sites for hackers, read them |
| yourself. If he has a subscription to a hacker magazine, go through it |
| and ask questions. Feel free to marvel at the cleverness of the latest |
| hacker technique. Then talk about consequences: the rising costs of legal |
| representation, the problems that a convicted felon encounters in academia |
| and the job market. Start looking at alternatives to a life of |
| cybercrime. |
|
|
| Constructive Alternatives |
|
|
| If your kid has a rebellious streak, I suggest giving up on trying to |
| suppress it; try to channel it instead. When hackers grow up, they often |
| find a reasonable substitute for the thrill of intrusion by working the |
| other side. Ask your teen how he would plug the latest security holes. |
| Get him thinking about it. Ask him for advice on protecting your own |
| e-mail or your ISP account. |
|
|
| The hacker tradition has always contained an element of disrespect for |
| authority. Up until 15 years ago, cracking systems was an acceptable rite |
| of passage in the industry, and some of the same people who pioneered |
| artificial intelligence and the personal computer also ushered in phone |
| phreaking, lock hacking, and computer intrusion. Early hackers believed |
| that computers were a public resource and that access to them and |
| knowledge about them should be free. |
|
|
| In a sense, the first-generation hackers won their battle when they |
| created the personal computer: It gave them free access to computing power |
| anytime they wanted. Today, kids can claim that victory on the Internet |
| by authoring a Web page. There is plenty of room for innovation and |
| creativity. |
|
|
| Today's PCs are as powerful as yesterday's mainframes. With today's PCs, |
| no one needs to break the law to explore technology. With the right tools, |
| and parental support, kids can earn the respect of their peers and get an |
| early start on their future by mastering the latest programming languages. |
| If my kid were a hacker, I'd encourage him to shun the instant |
| gratification of cracking a Fortune 500 company in favor of the greater |
| satisfaction of creating something unique from scratch. |
|
|
| Ultimately, that's what hacking really is all about. |
|
|
| 0x15>------------------------------------------------------------------------ |
|
|
| Title: Paging Network Hijacked |
| By: Chris Oakes |
| Date: 4:00am 24.Jul.98.PDT |
|
|
| [A non internet hacking article! Woohoo!] |
|
|
| Someone in Texas exploited a vulnerability in the PageMart paging network |
| this week, sending a flurry of mysterious pages to tiny screens |
| nationwide, confusing subscribers, and swamping the company's customer |
| service center with phone calls. |
|
|
| PageMart said a random discovery enabled the intruder to use a set of |
| pager addressing numbers to send messages to entire groups of customers, |
| rather than individual subscribers. But a security expert said the system |
| may have been hacked. |
| |
| PageMart spokeswoman Bridget Cavanaugh detailed Wednesday's incident in an |
| email late Thursday. "A person, unknown to PageMart," she said, |
| "discovered that three PINs [personal identification numbers] on our |
| paging terminal in Dallas were actually mail drops." |
|
|
| [snip...] |
|
|
| On Wednesday, PageMart customer and San Francisco resident Jeremiah Kelly |
| reported that he received odd messages for a period of about an hour and a |
| half on Wednesday afternoon. |
|
|
| Upon receiving one incomprehensible page -- unrecognizable in source or |
| content -- he suspected a simple "wrong-number" message. "But then, all of |
| a sudden, I got a blitz" Kelly said. Most notable was a recurring |
| message: "There is only one blu bula." |
|
|
| "I received one of those several times," he said. Another pair of messages |
| said "Mike, you're Mom drives a Passat," and another was sexually |
| suggestive. Both of the latter pages were signed "Christian." Kelly said |
| he received about 30 of the senseless messages. |
|
|
| [snip...] |
|
|
| "The incident impacted about 1.5 percent of our customers nationwide," |
| Cavanaugh said. "Statistically, it's a small number." PageMart provides |
| numeric and text paging service in all 50 states, Canada, Mexico, Central |
| America, and the Caribbean, serving approximately 2.7 million customers. |
|
|
| "It's a perfect example of how overconfidence can eventually cause a |
| problem," said Peter Shipley, who analyzes and bolsters system security |
| for accounting firm KPMG Peat Marwick. |
|
|
| Though it wasn't clear that PageMart's system was actually broken into, |
| Shipley said poor protection against break-ins is all too common. "I'm in |
| the business of doing these type of security audits, and a large number of |
| systems I've seen have easy password access -- under the assumption of |
| 'why would somebody want to hack it?'" |
|
|
| In fact, paging services are responsible for enormously valuable data, |
| from billing addresses to credit card information and more, Shipley said. |
| Then there are the messages themselves, which can be easily netted as they |
| make their way through the airwaves. |
|
|
| "Smaller companies believe they are not targets [for hackers]," concluded |
| KPMG's Shipley. "But small companies are as equally targeted as large |
| companies. They're stepping stones -- the small fish that hackers start |
| on." |
|
|
| 0x16>------------------------------------------------------------------------ |
|
|
| Title: FBI busts hacker who sold clandestine accounts on PageNet system |
| Date: July 30, 1998 7:28 p.m. EDT |
| Source: Nando Times |
|
|
| PageNet Inc., one of the largest wireless message providers, said U.S. |
| federal agents arrested a San Diego man Thursday who allegedly set up |
| unauthorized voice mailboxes and paging accounts on its system, costing |
| the company about $1 million. |
|
|
| [snip...] |
|
|
| 0x17>------------------------------------------------------------------------ |
|
|
| Title: EFF DES Cracker Machine Brings Honesty to Crypto Debate |
| Date: July 17, 1998 |
|
|
| "EFF DES CRACKER" MACHINE BRINGS HONESTY TO CRYPTO DEBATE |
| ELECTRONIC FRONTIER FOUNDATION PROVES THAT DES IS NOT SECURE |
|
|
| SAN FRANCISCO, CA -- The Electronic Frontier Foundation (EFF) today raised |
| the level of honesty in crypto politics by revealing that the Data |
| Encryption Standard (DES) is insecure. The U.S. government has long |
| pressed industry to limit encryption to DES (and even weaker forms), |
| without revealing how easy it is to crack. Continued adherence to this |
| policy would put critical infrastructures at risk; society should choose a |
| different course. |
|
|
| To prove the insecurity of DES, EFF built the first unclassified hardware |
| for cracking messages encoded with it. On Wednesday of this week the EFF |
| DES Cracker, which was built for less than $250,000, easily won RSA |
| Laboratory's "DES Challenge II" contest and a $10,000 cash prize. It took |
| the machine less than 3 days to complete the challenge, shattering the |
| previous record of 39 days set by a massive network of tens of thousands |
| of computers. The research results are fully documented in a book |
| published this week by EFF and O'Reilly and Associates, entitled "Cracking |
| DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design." |
|
|
| [snip...] |
|
|
| 0x18>------------------------------------------------------------------------ |
|
|
| Title: Hacking site gets hacked |
| By: Paul Festa |
| Source: CNET News.com |
| Date: October 28, 1998, 11:30 a.m. PT |
|
|
| Hacking and security news and information site Rootshell.com was the |
| subject of its own coverage today after suffering an early morning hack. |
|
|
| The hack, preserved here, occurred this morning at 5:12 a.m. PT, according |
| to Rootshell. Administrators took the site down after discovering the |
| attack at 6 a.m. PT. The site was restored two hours later. |
|
|
| "Steps have been taken to prevent re-entry, and full details are now being |
| turned over to law enforcement for what we hope will turn into arrests," |
| Rootshell administrator Kit Knox said this morning in a statement. |
|
|
| [Hrm. Lets give out scripts that help every clueless script kiddie |
| break into thousands of sites worldwide.. then narc off the one |
| that breaks into us. Time to face the music. That's like the pot |
| calling the kettle black. Name your cliche', they deserved it.] |
|
|
| Knox later said that the matter had been turned over to the FBI. |
|
|
| The attacker replaced the Rootshell.com front page with a rambling screed |
| peppered with profanity as well as references to groups and luminaries in |
| the hacking world, including imprisoned hacker and perennial cause Kevin |
| Mitnick. |
|
|
| The attacker also threatened to hit another hacking news site, AntiOnline. |
|
|
| 0x19>------------------------------------------------------------------------ |
|
|
| Title: From Criminals to Web Crawlers |
| By: Kristen Philipkoski |
| Date: 4:00am 15.Jul.98.PDT |
|
|
| A crime-fighting search engine used to fight terrorism and insurance scams |
| may soon find a home at one of the Web's top search engines. The system, |
| called VCLAS, has helped detectives crack cases all over the world. |
|
|
| "In 11 days, the PhoneFraud software helped law-enforcement agencies in |
| New York uncover US$1.2 billion in stolen services," said Jay Valentine, |
| president and CEO of InfoGlide, the company that owns the VCLAS software |
| package. |
|
|
| The software is built around a "Similarity Search Engine," which thrives |
| on imperfect and complex information, data that engineer David Wheeler |
| said often stumps search algorithms based on neural networks. |
|
|
| Similarity searching is well-suited to crime work, Wheeler said, because |
| investigations are often inherently random and disconnected. For instance, |
| if police are looking for a red vehicle, but a witness says it was maroon, |
| a traditional keyword search wouldn't register a match since it couldn't |
| recognize that the colors are similar. |
|
|
| 0x1a>------------------------------------------------------------------------ |
|
|
| Title: Running a Microsoft OS on a Network? Our Condolences |
| Date: July 21, 1998 |
|
|
| [The title alone made this worth including.] |
|
|
| The CULT OF THE DEAD COW (cDc) will release Back Orifice, a remote MS |
| Windows Administration tool at Defcon VI in Las Vegas (www.defcon.org) on |
| August 1. Programmed by Sir Dystic [cDc], Back Orifice is a |
| self-contained, self-installing utility which allows the user to control |
| and monitor computers running the Windows operating system over a network. |
|
|
| Sir Dystic sounded like an overworked sysadmin when he said, "The two main |
| legitimate purposes for BO are, remote tech support aid and employee |
| monitoring and administering [of a Windows network]." |
|
|
| Back Orifice is going to be made available to anyone who takes the time to |
| download it. So what does that mean for anyone who's bought into |
| Microsoft's Swiss cheese approach to security? Plenty according to Mike |
| Bloom, Chief Technical Officer for Gomi Media in Toronto. |
|
|
| [snip...] |
|
|
| None of this is lost on Microsoft. But then again, they don't care. |
| Security is way down on their list of priorities according to security |
| expert Russ Cooper of NT BUGTRAQ (www.ntbugtraq.com). "Microsoft doesn't |
| care about security because I don't believe they think it affects their |
| profit. And honestly, it probably doesn't." Nice. But regardless of which |
| side of the firewall you sit on, you can't afford not to have a copy of |
| Back Orifice. Here are the specs: |
|
|
| [snip...] |
|
|
| After August 3, Back Orifice will be available from www.cultdeadcow.com |
| free of charge. |
|
|
| 0x1b>------------------------------------------------------------------------ |
|
|
| Title: Security expert explains New York Times site break in |
| Date: September 18, 1998 |
| By: Ellen Messmer |
|
|
| Although the New York Times is not revealing the details of what happened |
| last weekend when it was hijacked by a hacker group, one security expert |
| has it figured out. |
|
|
| A group of hackers calling themselves Hackers for Girlies broke into the |
| Times news site on Sunday. The hackers took control of the site to display |
| their own diatribe complete with nude images and to protest the arrest of |
| hacker Kevin Mitnick. The Times worked for half a day to regain command of |
| its server. |
|
|
| Hackers often break in by exploiting security vulnerabilities associated |
| with default Common Gateway Interface scripts that ship with Web servers, |
| according to Patrick Taylor, director of strategic marketing at Internet |
| Security Systems in Atlanta. They exploit these scripts to send a string |
| of long commands to cause a buffer overflow that lets them into the |
| operating system. They first give themselves an account in the system and |
| then stick in a backdoor Trojan horse program such as "rootkit" to gain |
| and maintain root control, he said. |
|
|
| "CGI scripts are intended to pass commands from the Web server to |
| something in the operating system, perhaps to pull database information," |
| Taylor said. "But you should get rid of these superfluous CGI scripts and |
| depend on your own custom scripts." |
|
|
| The Times may have had a long struggle regaining control of its Web site |
| because the latest Trojan horses are designed so well that they hide |
| within the operating system, encrypted or even providing the same checksum |
| as the legitimate operating system. |
|
|
| "It's nefarious--the hacker essentially has remote administration of the |
| Web server," Taylor said. "You can't rely on a backup of the machine. You |
| may have to reinstall the entire operating system." |
|
|
| By coincidence, the Times had once looked at using the ISS security gear, |
| but decided not to, he said. The Times declined to discuss any aspect of |
| its Web operations, saying it was "a matter of security." |
|
|
| [The real reason for this article and quoting a PR person from |
| ISS maybe? Fact is, ISS didn't audit the network before OR |
| after the breakin. How would this guy know the method they used |
| to compromise the machine?] |
|
|
| The "Hackers for Girlies" ranted in its own posting to have "busted root" |
| on the Times, and directed some invective toward Times reporter John |
| Markoff and security expert Tsutomu Shimomura for their respective roles |
| in the investigation of hacker Kevin Mitnick, now held in jail. Markoff |
| and Shimomura two years ago collaborated on a book entitled "Takedown" |
| about the law enforcement pursuit of Mitnick. In its own account, the |
| Times said the hacker incident at nytimes.com may be related to an |
| upcoming trial in January of Mitnick. |
|
|
| While hacker rantings and pornography can be bad enough to discover on a |
| Web site, a far more serious scenario involves a hijacker more |
| surreptitiously posting information that has been slightly changed, |
| leading the reader to view it as authentic. |
|
|
| "This could end up like 'War of the Worlds,' where people went into a |
| panic because they didn't know what they were hearing on the radio was |
| made up," commented Doug Barney, Network World news editor. |
|
|
| 0x1c>------------------------------------------------------------------------ |
|
|
| Title: Merriam-Webster Taken Offline Old Fashioned Way |
| Date: Wed Aug 5 00:41:57 MDT 1998 |
| Source: www.m-w.com |
|
|
| What happened? |
|
|
| On Thursday night, July 30th, the facility that hosts Merriam-Webster's |
| Web site was burglarized and its servers were stolen. We've managed to |
| restore limited capacity, but we need to obtain new hardware from our |
| suppliers before we can return to full service. We hope to have the entire |
| site active again in a few days. We apologize for the inconvenience and |
| hope you will bear with us as we deal with the situation. |
|
|
| Thank you for your patience. |
|
|
| --The Merriam-Webster Web Team |
|
|
| [Guess we shouldn't put the computer by the window...] |
|
|
| 0x1d>------------------------------------------------------------------------ |
|
|
| Title: Long Haired Hacker Works Magic [my title] |
| Source: Nando Times |
| Date: September 20, 1998 |
|
|
| The hacker calling himself Mudge pushed his long hair back, scratched his |
| beard and stared at the computer screen. He knew there was something wrong |
| with the data traffic he was watching, but what was it? |
| |
| A week earlier, Mudge and his fellow hackers in their hangout known as the |
| L0pht -- pronounced "loft" -- had acquired some software that was supposed |
| to let computers talk to each other in code. But as Mudge watched the data |
| he realized someone else was doing the same and maybe even decoding it, |
| which shouldn't happen. |
| |
| "So you are saying that you're using DES to communicate between the |
| computers?" Mudge recalled asking representatives of the software maker. |
| Yes, they said, they were using DES, a standard encryption method that for |
| years was considered virtually uncrackable. |
|
|
| But this wasn't DES, thought Mudge. It's almost as if... |
|
|
| Whoa. He blinked and felt the adrenaline kick in. This wasn't secure at |
| all. In fact, the encoding was only slightly more complex than the simple |
| ciphers kids did in grade school -- where "A" is set to 1, "B" is set to |
| 2, and so on. |
|
|
| The company was selling this software as a secure product, charging |
| customers up to $10,000. And yet, it had a security hole big enough to |
| waltz through. |
| |
| Instead of exploiting this knowledge, Mudge confronted the company. |
|
|
| "You realize there isn't any secure or 'strong' encoding being used in |
| your communications between the computers, don't you?" he asked. |
|
|
| "Well..." |
|
|
| "And that you claimed you were using DES to encrypt the data," he pressed. |
|
|
| "That will go in the next revision." |
|
|
| Mudge is a "real" hacker -- one who used to snoop around the nation's |
| electronic infrastructure for the sheer love of knowing how it worked. His |
| kind today are sighted about as often as the timberwolf, and society has |
| attached to them the same level of legend. |
|
|
| Like the wolf, they were once considered a scourge. Law enforcement and |
| telecommunication companies investigated and arrested many of them during |
| the late 1980s and early '90s. |
|
|
| Today, many elite hackers of the past are making a go at legitimate work, |
| getting paid big bucks by Fortune 500 companies to explore computer |
| networks and find the weak spots. |
|
|
| And none too soon. The void left by the old hackers has been filled by a |
| new, more destructive generation. |
|
|
| So today, Mudge -- who uses a pseudonym like others in the hacker |
| community, a world where anonymity keeps you out of trouble -- wears a |
| white hat. As part of L0pht, the hacker think tank, he and six comrades |
| hole up in a South End loft space in Boston and spend their evenings |
| peeling open software and computer networks to see how they work. |
|
|
| When they find vulnerabilities in supposedly secure systems, they publish |
| their findings on the Web in hopes of embarrassing the companies into |
| fixing the problems. A recent example: They posted notice via the Internet |
| of a problem that makes Lotus Notes vulnerable to malicious hackers... |
|
|
| A Lotus spokesman said the company was aware of the flaw but it was |
| extremely technical and unlikely to affect anyone. |
|
|
| The hackers at L0pht have made enemies among industry people, but they |
| command respect. They were even called to testify before the U.S. Senate |
| Committee on Governmental Affairs in May. |
|
|
| Why do they publish what they find? |
|
|
| "If that information doesn't get out," Mudge replies, "then only the bad |
| guys will have it." |
| |
| The "bad guys" are the hacker cliche: secretive teens lurking online, |
| stealing credit card numbers, breaking into Pentagon systems, and |
| generally causing trouble. One of L0pht's members, Kingpin, was just such |
| a cad when he was younger, extending his online shenanigans to real-world |
| breaking and entering. Today, L0pht keeps him out of mischief, he said. |
|
|
| "We're like midnight basketball for hackers," said Weld Pond, another |
| member. |
| |
| **** |
|
|
| Malicious hacking seems to be on the rise. |
|
|
| Nearly two out of three companies reported unauthorized use of their |
| computer systems in the past year, according to a study by the Computer |
| Security Institute and the FBI. Another study, from Software AG Americas, |
| said 7 percent of companies reported a "very serious" security breach, |
| and an additional 16 percent reported "worrisome" breaches. However, 72 |
| percent said the intrusions were relatively minor with no damage. |
|
|
| American companies spent almost $6.3 billion on computer security last |
| year, according to research firm DataQuest. The market is expected to grow |
| to $13 billion by 2000. |
|
|
| Government computers are vulnerable, too. The Defense Department suffered |
| almost 250,000 hacks in 1995, the General Accounting Office reported. Most |
| were detected only long after the attack. |
|
|
| This is why business booms for good-guy hackers. |
|
|
| Jeff Moss, a security expert with Secure Computing Inc., runs a |
| $995-a-ticket professional conference for network administrators, where |
| hackers-cum-consultants mingle with military brass and CEOs. |
|
|
| "I don't feel like a sellout," said Moss, who wouldn't elaborate on his |
| hacking background. "People used to do this because they were really into |
| it. Now you can be into it and be paid." |
|
|
| News reports show why such services are needed: |
|
|
| ----Earlier this month, hackers struck the Web site of The New York Times, |
| forcing the company to shutter it for hours. Spokeswoman Nancy Nielsen |
| said the break-in was being treated as a crime, not a prank. The FBI's |
| computer crime unit was investigating. |
|
|
| ----This spring, two California teenagers were arrested for trying to hack |
| the Pentagon's computers. Israeli teen Ehud Tenebaum, also known as "The |
| Analyzer," said he mentored the two on how to do it. The two Cloverdale, |
| Calif., youths pleaded guilty in late July and were placed on probation. |
|
|
| ----Kevin Mitnick, the only hacker to make the FBI's 10 Most Wanted list, |
| was arrested in 1995, accused of stealing 20,000 credit card numbers. He |
| remains in prison. A film called "TakeDown," about the electronic |
| sleuthing that led to Mitnick's capture, is in the works. Comments |
| protesting Mitnick's prosecution were left during the hack of the New York |
| Times Web site. |
|
|
| ----In 1994, Vladimir Levin, a graduate of St. Petersburg Tekhnologichesky |
| University, allegedly masterminded a Russian hacker gang and stole $10 |
| million from Citibank computers. A year later, he was arrested by Interpol |
| at Heathrow airport in London. |
|
|
| ****** |
|
|
| "Lemme tell ya," growled Mark Abene one night over Japanese steak skewers. |
| "Kids these days, they got no respect for their elders." |
|
|
| Abene, known among fellow hackers as Phiber Optik, should know. He was one |
| of those no-account kids in the 1980s when he discovered telephones and |
| computers. For almost 10 years, he wandered freely through the nation's |
| telephone computer systems and, oh, the things he did and saw. |
|
|
| Celebrities' credit reports were his for the taking. Unlimited free phone |
| calls from pilfered long-distance calling card numbers. Private phone |
| lines for his buddies, not listed anywhere. And the arcane knowledge of |
| trunk lines, switches, the entire glory of the network that connected New |
| York City to the rest of the world. |
|
|
| But Abene's ticket to ride was canceled in January 1994, when, at age 22, |
| he entered Pennsylvania's Schuylkill Prison to begin serving a |
| year-and-a-day sentence for computer trespassing. The FBI and the Secret |
| Service described him as a menace. The sentencing judge said Abene, as a |
| spokesman for the hacking community, would be made an example. |
|
|
| And yet, to many in the digital community, Abene's offenses amounted to |
| unbridled curiosity. He was just a kid poking around, doing what teen boys |
| do, going to places they're told to avoid. |
|
|
| "Phree Phiber Optik" pins appeared. Many felt Abene embodied the hacker |
| ethic espoused by his friend and fellow hacker, Paul Stira: "Thou Shalt |
| Not Destroy." |
|
|
| With black hair parted in the middle and falling to the center of his |
| back, a thin beard ringing his mouth, the 26-year-old Abene still looks |
| like a mischievous kid. Hacking, he said, is hardwired in boys. When they |
| play with toys when they're young, they break them, then try to figure out |
| how the parts fit back together. |
|
|
| He added, "For some of us, it just never goes away." |
|
|
| ****** |
|
|
| Still, the hackers of the 1980s and early '90s have grown up. Some got |
| busted, others simply graduated from college and fell out of the scene. |
|
|
| Today, many want to be seen as mainstream, said Jeremy Rauch, a network |
| security expert for Secure Computing Inc. When it's time to talk |
| consulting contracts with major corporations, the hair gets neatly combed, |
| the suit replaces the combat boots and black T-shirt, and the |
| counterculture rhetoric gets toned down. |
|
|
| A hacker in San Francisco who edits the online publication Phrack and goes |
| by the pseudonym Route talks about his job at a security firm as a sign of |
| maturity. Contentedly, he notes he can work from home, write as much code |
| as he can and never punch a clock. |
|
|
| "Are there still hackers out there?" asked Mike Godwin, counsel for the |
| Electronic Frontier Foundation, a cyber-rights group. In the early 1990s, |
| he pushed hard for the organization to champion Abene and other members of |
| the cyber gang Masters of Deception. By 1993, he said, hysteria |
| surrounding hackers began to sputter, to be replaced by a fear of |
| pornography. |
|
|
| "There never were very many hackers," he said, not major ones, anyway. |
| Mainly, they were and are "this tiny minority of 13- to 18-year-olds who |
| learned how to make toll-calls for free." |
|
|
| Today's younger hackers pull programs off the Web that sniff for passwords |
| and unlock backdoors automatically. It's the equivalent of rattling every |
| door on a street and finally getting lucky, chancing upon one that's |
| unlocked. |
|
|
| As for the true hackers of the first generation, Godwin said: "These guys |
| are genuinely smart and genuinely have a fascination with the technology. |
| And they're mostly harmless." |
|
|
| ********* |
|
|
| What do younger hackers say to all this? |
|
|
| Not much, if you judge by interviews at DefCon6.0, the sixth annual hacker |
| forum and party held in Las Vegas at the end of July. |
|
|
| Some said they hack to learn. Others took a counter-culture stance: |
| hacking as civil disobedience. They wouldn't give names or talk |
| specifically about any criminal activities. It was as if they wanted to |
| present themselves as blank slates, upon which the fears of their |
| non-wired elders could be inscribed. |
|
|
| At DefCon, they set off stink bombs at one point, and pulled other |
| juvenile pranks. |
|
|
| "Paging Mr. Mitnick," the intercom droned through the hotel-casino's |
| meeting rooms. The unwitting hotel staff member repeated the call for the |
| jailed hacker. "Paging Mr. Kevin Mitnick." |
|
|
| Pony-tailed guys dressed in black smirked. Gotcha. |
|
|
| As hard house and techno music provided a soundtrack, they drooled over |
| new software and pawed through piles of stuff for sale: computer |
| equipment, of course, but also more books on conspiracy, privacy |
| protection, and police methods than any paranoid could want. |
|
|
| Among the titles: "Scanners & Secret Frequencies," "Secrets of a Super |
| Hacker," even "Throbbing Modems." |
|
|
| The kids flocked to DefCon's talk by the "white hat" hackers of L0pht. |
|
|
| "We're in the middle generation right now," said convention organizer |
| Moss. "You've got your original hackers from MIT -- the old school -- who |
| are established. They're the forefathers of this information revolution. |
| And you've got us who watched computers go from mainframe to desktop to |
| laptop. And you've got the younger generation that have always known |
| computers." |
|
|
| 0x1e>------------------------------------------------------------------------ |
|
|
| Title: Body of Evidence |
| By: Beverly Hanly |
| Date: 4:00am 5.Aug.98.PDT |
|
|
| Real criminals are tried in real courts, so why shouldn't virtual |
| criminals be tried in virtual courts? |
|
|
| A handful of legal scholars from the Institute on the Arts and Civic |
| Dialogue (IACD) are mulling over the question and will convene Wednesday |
| to discuss whether virtual courts are the best forum for cybercrime trials |
| and if a virtual legal system could lead to new legal processes regarding |
| real world crimes. |
|
|
| The experts will join multimedia artist Shu Lea Cheang, creator of the |
| Brandon project, for a webcast forum from 8 to 11 pm, EDT, at the Harvard |
| Law School. |
|
|
| The group will play out a fictitious courtroom drama based on several |
| disputes involving cyberetiquette, gender identity, and the hazy line |
| between fantasy vs. reality as the first public forum in the year-long |
| Brandon project commissioned by New York's Guggenheim Museum. Brandon |
| explores issues of gender identity and the consequences of experimenting |
| with sexuality in real life and in cyberspace. |
|
|
| The ongoing media and legal debate regarding hate speech and the |
| proliferation of sexual content on the Internet and whether or not these |
| are harmful -- and to whom -- is the territory the mock trial will cover. |
|
|
| Harvard theater director Liz Diamond will collaborate with Cheang to guide |
| the group as they dramatize elements drawn from real-life sexual assault |
| cases, including that of the project's namesake Teena Brandon, a |
| transsexual who was murdered in Nebraska in 1993. Other cases will involve |
| a virtual trial for "cyberrape," a MUD character named Mr. Bungle, and |
| the FBI arrest of Michigan student Jake Baker for his rape-and-murder |
| fantasy about a fellow student posted to a Usenet newsgroup in 1994. |
|
|
| Actors will play the roles of victims and perpetrators, while professors |
| from Harvard, University of Virginia, and Columbia law schools will act as |
| "standing jurors" to examine and comment on the legalities. |
|
|
| "This is a venue where you can experiment with the process and substance |
| of these [cyberlaw] cases," said Jennifer Mnookin, professor of law at |
| Virginia's School of Law in Charlottesville, who will sit in on the |
| session. She feels that virtual worlds like LambdaMOO can provide a new |
| and more appropriate arena for dispute resolution. |
|
|
| "Part of what's at issue here is how much someone can be hurt with words," |
| said Mnookin. "Someone who commits a violation in cyberspace shouldn't |
| necessarily be subject to consequences in real courtrooms. Something like |
| the LambdaMOO 'cyberrape' was appropriately settled in a virtual court. |
| The perpetrator was expelled from that world, his virtual identity was |
| annihilated -- he was 'toaded.' What is a violation in one world might not |
| be in another." |
|
|
| Virtual penalties can translate from one world to the other as well. |
| Cheang, in her virtual court, suggests the idea of "virtual castration" as |
| an alternative to "chemical castration" advocated by some as a way of |
| dealing with sexual offenders. |
|
|
| The August public event in Cambridge, Massachusetts, is the first time |
| since the Brandon project began on 20 June that Cheang will be able to |
| interact with both a live and a Net audience. |
|
|
| "The test will serve as a base toward constructing a digiarchitextual |
| space of a virtual court at the Guggenheim's [proposed] virtual museum," |
| said Cheang, who will collaborate with an architect of physical spaces to |
| create a "courtroom" at the museum. "My work has always fused actual and |
| virtual space." |
|
|
| Netizens need nothing more than an Internet connection to tune in to the |
| mock trial. But Cheang also wants to include a public that has no access |
| to Net technology. |
|
|
| Anyone in the Harvard area who's interested can physically attend the |
| staged trial. In New York, street audiences can visit the Guggenheim |
| SoHo's video wall, which is made up of 75 contiguous 40-inch projection |
| cubes. The video wall will display images from the Brandon project and |
| audiences will be able to interact at scheduled times. |
|
|
| "We're not sure how the 'experimentation' with the audience will go," said |
| Cheang. "Maybe we'll fail badly. But it is this uncertainty, this feeling |
| that we're exploring new ground in public interaction that is most |
| exciting for me and my collaborators here at the Institute." |
|
|
| Law professor Mnookin looks at the experiment as a venue that can open up |
| the dialog on cyberlaw issues. "What's interesting to me about 'virtual |
| law' is that it's much more obvious than in the real world that the rules |
| are malleable, that they're created by the participants. |
|
|
| "In the real world, it's easy to take the legal processes for granted, to |
| assume that [those processes] can't easily be transformed," she continued. |
| "If virtual worlds are used as laboratories, it's easier to recognize the |
| possibilities for change -- both within a virtual environment, and, just |
| maybe, in the real world as well." |
|
|
| The Brandon Project is hosted at Harvard in conjunction with the brand-new |
| IACD until 14 August. IACD puts artists in various media together with a |
| community of scholars, journalists, and civic activists to explore current |
| events and controversies. |
|
|
| After the test trial, Cheang will move on to Amsterdam, Netherlands, to |
| begin setting up the next live installation of the project: "Digi Gender, |
| Social Body: Under the Knife, Under the Spell of Anesthesia," to be |
| webcast in September 1998. "Would the Jurors Please Stand Up? Crime and |
| Punishment as Net Spectacle" is scheduled for May 1999. |
|
|
| 0x1f>------------------------------------------------------------------------ |
|
|
| Title: The Golden Age of Hacktivism |
| By: Niall McKay |
| Date: 4:00a.m. 22.Sep.98.PDT |
|
|
| On the eve of Sweden's general election, Internet saboteurs targeted the |
| Web site of that country's right-wing Moderates political party, defacing |
| pages and establishing links to the homepages of the left-wing party and a |
| pornography site. |
|
|
| But the Scandanavian crack Saturday was not the work of bored juveniles |
| armed with a Unix account, a slice of easily compiled code, and a few |
| hours to kill. It advanced a specific political agenda. |
|
|
| "The future of activism is on the Internet," said Stanton McCandlish, |
| program director of the Electronic Frontier Foundation. "More and more, |
| what is considered an offline issue, such as protesting the treatment of |
| the Zapatistas in Mexico, is being protested on the Net." |
|
|
| In the computer-security community, it's called "hacktivism," a kind of |
| electronic civil disobedience in which activists take direct action by |
| breaking into or protesting with government or corporate computer systems. |
| It's a kind of low-level information warfare, and it's on the rise. |
|
|
| Last week, for example, a group of hackers called X-pilot rewrote the home |
| page of a Mexican government site to protest what they said were instances |
| of government corruption and censorship. The group, which did not reply |
| to several emails, made the claims to the Hacker News Network. The |
| hacktivists were bringing an offline issue into the online world, |
| McClandish said. |
|
|
| The phenomenon is becoming common enough that next month, the longtime |
| computer-security group, the Cult of the Dead Cow will launch the resource |
| site hacktivism.org. The site will host online workshops, demonstrations, |
| and software tools for digital activists. |
|
|
| "We want to provide resources to empower people who want to take part in |
| activism on the Internet," said Oxblood Ruffian, a former United Nations |
| consultant who belongs to the Cult of the Dead Cow. |
|
|
| Oxblood Ruffian's group is no newcomer to hacktivism. They have been |
| working with the Hong Kong Blondes, a near-mythical group of Chinese |
| dissidents that have been infiltrating police and security networks in |
| China in an effort to forewarn political targets of imminent arrests. |
|
|
| In a recent Wired News article, a member of the group said it would target |
| the networks and Web sites of US companies doing business with China. |
|
|
| Other recent hacktivist actions include a wave of attacks in August that |
| drew attention to alleged human rights abuses in Indonesia. In June, |
| attacks on computer systems in India's atomic energy research lab |
| protested that country's nuclear bomb tests. |
|
|
| More recently, on Mexican Independence Day, a US-based group called |
| Electronic Disturbance Theater targeted the Web site of Mexican President |
| Ernesto Zedillo. The action was intended to protest Zedillo's alleged |
| mistreatment of the Zapatista rebels in Chiapas. Nearly 8,000 people |
| participated in the digital sit-in, which attempted to overwhelm the |
| Mexican president's Web servers. |
|
|
| "What we are trying to do is to find a place where the public can register |
| their dissatisfaction in cyberspace, so that your everyday [mouse] clicker |
| can participate in a public protest," said EDT co-founder Ricardo. |
|
|
| The apparent increase in hacktivism may be due in part to the growing |
| importance of the Internet as a means of communication. As more people go |
| online, Web sites become high-profile targets. |
|
|
| It also demonstrates that many government sites are fairly easy to crack, |
| said one former member of Milw0rm, the now defunct group that defaced the |
| Indian research lab's Web site. In an interview in Internet Relay Chat, |
| the cracker rattled off a list of vulnerable US government Web sites -- |
| including one hosting an electron particle accelerator and another of a US |
| politician -- and their susceptibility to bugs. |
|
|
| "They don't pay enough for computer people," said the cracker, who goes by |
| the name t3k-9. "You get $50,000 for a $150,000 job." |
|
|
| Some security experts also believe that there is a new generation of |
| crackers emerging. "The rise in political cracking in the past couple of |
| years is because we now have the first generation of kids that have grown |
| up with the Net," John Vranesevich, founder of the computer security Web |
| site AntiOnline. "The first generation of the kids that grew up hacking |
| are now between 25 and 35 - often the most politically active years in |
| peoples' lives." |
|
|
| "When the Cult of the Dead Cow was started in 1984, the average age [of |
| our members] was 14, and they spent their time hacking soda machines," |
| said Oxblood Ruffian. "But the last couple of years has marked a turning |
| point for us. Our members are older, politicized, and extremely |
| technically proficient." |
|
|
| While hacktivists are lining up along one border, police and law |
| enforcement officials are lining up along another. |
|
|
| This year the FBI will establish a cyber warfare center called the |
| National Infrastructure Protection Center. The US$64 million organization |
| will replace the Computer Investigations and Infrastructure Threat |
| Assessment Center and involve the intelligence community and the military. |
|
|
| Allan Paller, director of research for the SANS Institute, said the FBI is |
| staffing the new facility with the government's top security experts. |
| "They are stealing people from good places, including a woman from the |
| Department of Energy who was particularly good," he said in a recent |
| interview. "They are taking brilliant people." |
|
|
| Paller also said that a grassroots effort is under way in Washington to |
| establish a National Intrusion Center, modeled after the Centers for |
| Disease Control. |
|
|
| "There is definitely an increased threat of cyber terrorism," said Stephen |
| Berry, spokesman for the FBI press office in Washington. |
|
|
| As offline protests -- which are protected in the United States by the |
| constitution -- enter the next digital age, the question remains: How will |
| the FBI draw the distinction between relatively benign online political |
| protests and cyber terrorism? |
|
|
| 0x20>------------------------------------------------------------------------ |
|
|
| Title: Phrack straddles the world of hackers |
| Source: Nando Times |
| Date: September 20, 1998 |
|
|
| The lines of text scrolled off the screen quickly, but the bleached-blond |
| hacker snatched quick glances at the visitors' log on his Web page. Lots |
| of visitors using military and government computers. The hacker, who calls |
| himself Route, said he always gets a kick out of the feds' visits. He |
| smiled. |
| |
| The FBI, the CIA and the others "wouldn't be doing their job if they |
| weren't tracking computer information both legitimate and illegitimate," |
| Route said. "I guess Phrack falls somewhere in between." |
| |
| Phrack is an online publication called a 'zine. It's a digital chimera: |
| written for hackers but read by law enforcement, too. It's been the |
| subject of federal prosecution, yet it still operates in the open. Its |
| name combines "hack" and "phreak," which refers to phone hacking. |
| |
| It's got attitude, technical know-how and in many ways defines today's |
| hacker scene. It first hit the electronic bulletin boards Nov. 17, 1985, |
| ages ago in hacker years. |
| |
| To put its longevity in perspective, Phrack came out two years after the |
| movie "WarGames" in which actor Matthew Broderick established the |
| now-cliched image of the hacker as the lonely kid who altered his grades |
| with a computer. Phrack predates the World Wide Web by almost a decade. |
| And Phrack is older than many of its readers, who number about 8,000, said |
| Route, who refuses to give his real name. |
| |
| Route, 24, doesn't look like the scrawny computer nerd with the |
| cathode-ray pallor so many think of when the word hacker is mentioned. |
| Silver earrings dangle from each ear and a bar pierces his tongue. Spidery |
| tattoos creep down his shoulders and over biceps grown solid with hours of |
| iron work. |
| |
| Behind his glower lies a keen mind that cuts through computer network |
| problems like a digital knife, an invaluable skill for his day job at a |
| computer security firm with Fortune 500 companies for clients. Route |
| refused to name his company. |
| |
| Phrack's improbable history begins in 1985 when a hacker with the handle |
| Taran King cobbled together various subversive texts that had been |
| circulating like Soviet-era samizdat on the archipelago of underground |
| electronic bulletin boards. It included all sorts of mischief-making: |
| "How to Pick Master Locks," "How to Make an Acetylene Bomb" and |
| "School/College Computer Dial-Ups." |
| |
| But Phrack found itself the focus of federal prosecution in 1990, when |
| editor Craig Neidorf, also known as Knight Lightning, was prosecuted by |
| the Chicago Computer Fraud and Abuse Task Force. His alleged crime? He |
| published a document in Phrack with certain details of the emergency 911 |
| systems in use around the country. It had been given to him by another |
| hacker who had copied it from computers owned by BellSouth, which valued |
| it at almost $80,000. |
| |
| But the task force wanted to prove the document was more than valuable. |
| Assistant U.S. Attorney William J. Cook said it put dangerous information |
| in the hands of hackers. |
|
|
| The case fell apart when Neidorf's lawyer proved that more detailed |
| information about the system had appeared in other publications. You could |
| order them from phone company technical catalogs for $13. The charges were |
| dropped. Neidorf's trial was over. |
|
|
| If today's Phrack is a bit less confrontational, that's understandable. |
| Like many of the older hackers, Route is shifting his focus away from |
| anarchy texts and phone hacking to computer security. Its "how-to" days |
| are pretty much over. |
|
|
| "Phrack is not meant to be a manual of vulnerabilities," he said. |
|
|
| As the editor, Route knows that Phrack can still be used for illegal |
| purposes. "But you can't hold people completely liable for just putting |
| information out there." |
|
|
| He said he has had "blatantly illegal stuff" sent to him. Once, he said he |
| received the technical specifications for most pager systems used in the |
| country, complete with how to hack those systems. He didn't publish. |
|
|
| "It's a judgment call," he said. "I have no intention of running up |
| against the law or (upsetting) the military." |
|
|
| But it's almost guaranteed that something gleaned from Phrack will be used |
| against the computer system of a big and powerful organization or |
| business. |
|
|
| "The scene is going to do what the scene is going to do," he said. "It's |
| like any clique in society. You have good people and you have bad people." |
|
|
| 0x21>------------------------------------------------------------------------ |
|
|
| Title: Cops see little hope in controlling computer crime |
| By: Rob Lemos, |
| Source: ZDNN |
| Date: August 6, 1998 10:16 AM PT |
|
|
| Despite making headway combating high-tech criminals, law enforcement |
| officials say they remain worried about their ability to investigate and |
| prosecute cyber crimes. Encryption, anonymity, and the jurisdictional |
| problems posed by a global Internet are quickly turning from small |
| headaches to full-blown migraines for local, state, and federal police |
| forces. |
|
|
| "It's hard to predict where we will be in 10 years," said Scott Charney, |
| chief of the computer crime and intellectual property section of the U.S. |
| Department of Justice. "But there are going to be all sorts of birthing |
| pains." Charney gathered here with other computer-savvy law enforcement |
| officials to attend an international symposium on criminal justice issues |
| at the University of Illinois at Chicago. The symposium focused on |
| high-tech crime, cyber-terrorism, and information warfare. |
|
|
| Invisible criminals Law enforcement officers say one of their biggest |
| challenges paradoxically remains knowing when a crime is committed. |
|
|
| According to the General Accounting Office, there were 250,000 attempted |
| break-ins at the Department of Defense in 1995. NASA estimates that |
| crackers -- hacker criminals -- broke in to over 120,000 of its systems in |
| 1996. Yet, few of those incidents are detected, much less reported. When |
| DOD hackers broke into their own servers in 1996 and 1997, they attacked |
| 38,000 machines. Only four percent of the incidents were detected. Out of |
| that number, only 27 percent of detected break-ins were reported. |
|
|
| "We will get better," said Doris Gardner, an investigator with the |
| National Infrastructure Protection Center, a new federal agency |
| established to fight computer crime. "We need to educate -- to work better |
| with each other." |
|
|
| Pandora's box |
|
|
| Yet, even as law enforcement is educating itself on the challenges ahead, |
| experts here said cyber-criminals continue to refine their abilities. |
|
|
| According to the DOJ's Charney, the number of cases involving encrypted |
| data climbed from three percent in 1996 to seven percent in 1997. If that |
| trend continues, he said, the only tactic left for law enforcement is to |
| increase its surveillance capabilities. |
|
|
| "If privacy advocates get their way on encryption," said Charney, "they |
| may not be happy." |
|
|
| With no way to read into encrypted electronic documents, he added, the FBI |
| and others will have to rely on capturing the evidence at the source. "And |
| that could really decrease privacy." |
|
|
| Even so, there are other ways around encryption. In 1996, when an ISP |
| reported that its system had been cracked, all FBI leads ran into brick |
| walls. Luckily, the cracker, Carlos Salgado Jr. -- who had stolen over |
| 100,000 credit card numbers worth more than an estimated $160 million -- |
| found a potential buyer who suspected his credit card was one of the ones |
| on the block to be sold. The "buyer" contacted the FBI and became a |
| cooperative witness in the case. |
|
|
| Despite Salgado's extensive use of encryption -- both his e-mails and the |
| actual credit-card data were encrypted -- the FBI had no problems |
| collecting evidence, because their witness received all the codes from |
| Salgado. |
|
|
| Luck, or a trend? It's too early to tell, but Gardner, for one, seems |
| positive on the FBI's ability to prosecute. "If we know about it," she |
| said, "we can usually prosecute it." |
|
|
| ----[ EOF |
|
|