| ==Phrack Inc.== | |
| Volume Two, Issue 22, File 12 of 12 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN P h r a c k W o r l d N e w s PWN | |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN | |
| PWN Issue XXII/Part 4 PWN | |
| PWN PWN | |
| PWN Created by Knight Lightning PWN | |
| PWN PWN | |
| PWN Written and Edited by PWN | |
| PWN Knight Lightning and Taran King PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Networks Of Computers At Risk From Invaders December 3, 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By John Markoff (New York Times) | |
| Basic security flaws similar to the ones that let intruders gain illegal entry | |
| to military computer networks in recent weeks are far more common than is | |
| generally believed, system designers and researchers say. | |
| And there is widespread concern that computer networks used for everyday | |
| activities like making airline reservations and controlling the telephone | |
| system are highly vulnerable to attacks by invaders considerably less skilled | |
| than the graduate student whose rogue program jammed a nationwide computer | |
| network last month. | |
| For example, the air traffic control system could be crippled if someone | |
| deliberately put wrong instructions into the network, effectively blinding | |
| controllers guiding airplanes. | |
| The two recent episodes have involved military computers: One at the Mitre | |
| Corporation, a company with Pentagon contracts, and the other into Arpanet, a | |
| Defense Department network with links to colleges. But illegal access to | |
| computer systems can compromise the privacy of millions of people. | |
| In 1984, TRW Inc. acknowledged that a password providing access to 90 million | |
| credit histories in its files had been stolen and posted on a computerized | |
| bulletin board system. The company said the password may have been used for as | |
| long as a month. | |
| This year an internal memorandum at Pacific Bell disclosed that sophisticated | |
| invaders had illegally gained access to telephone network switching equipment | |
| to enter private company computers and monitor telephone conversations. | |
| Computer security flaws have also been exploited to destroy data. In March | |
| 1986 a computer burglar gained access by telephone to the office computer of | |
| Rep. Ed Zschau of California, destroyed files and caused the computer to break | |
| down. Four days later, staff workers for Rep. John McCain of Arizona, now a | |
| senator, told the police they had discovered that someone outside their office | |
| had reached into McCain's computer and destroyed hundreds of letters and | |
| mailing addresses. | |
| In Australia last year, a skilled saboteur attacked dozens of computers by | |
| destroying an underground communication switch. The attack cut off thousands | |
| of telephone lines and rendered dozens of computers, including those at the | |
| country's largest banks, useless for an entire day. | |
| Experts say the vulnerability of commercial computers is often compounded by | |
| fundamental design flaws that are ignored until they are exposed in a glaring | |
| incident. "Some vulnerabilities exist in every system," said Peter Neumann, a | |
| computer scientist at SRI International in Menlo Park, California. "In the | |
| past, the vendors have not really wanted to recognize this." | |
| Design flaws are becoming increasingly important because of the rapidly | |
| changing nature of computer communications. Most computers were once isolated | |
| from one another. But in the last decade networks expanded dramatically, | |
| letting computers exchange information and making virtually all large | |
| commercial systems accessible from remote places. But computer designers | |
| seeking to shore up security flaws face a troubling paradox: By openly | |
| discussing the flaws, they potentially make vulnerabilities more known and thus | |
| open to sabotage. | |
| Dr. Fred Cohen, a computer scientist at the University of Cincinnati, said most | |
| computer networks were dangerously vulnerable. "The basic problem is that we | |
| haven't been doing networks long enough to know how to implement protection," | |
| Cohen said. | |
| The recent rogue program was written by Robert Tappan Morris, a 23-year-old | |
| Cornell University graduate student in computer science, friends of his have | |
| said. The program appears to have been designed to copy itself harmlessly from | |
| computer to computer in a Department of Defense network, the Arpanet. Instead | |
| a design error caused it to replicate madly out of control, ultimately jamming | |
| more than 6,000 computers in this country's most serious computer virus attack. | |
| For the computer industry, the Arpanet incident has revealed how security flaws | |
| have generally been ignored. Cohen said most networks, in effect, made | |
| computers vulnerable by placing entry passwords and other secret information | |
| inside every machine. In addition, most information passing through networks | |
| is not secretly coded. While such encryption would solve much of the | |
| vulnerability problem, it would be costly. It would also slow communication | |
| between computers and generally make networks much less flexible and | |
| convenient. | |
| Encryption of data is the backbone of security in computers used by military | |
| and intelligence agencies. The Arpanet network, which links computers at | |
| colleges, corporate research centers and military bases, is not encrypted. | |
| The lack of security for such information underscored the fact that until now | |
| there has been little concern about protecting data. | |
| Most commercial systems give the people who run them broad power over all parts | |
| of the operation. If an illicit user obtains the privileges held by a system | |
| manager, all information in the system becomes accessible to tampering. | |
| The federal government is pushing for a new class of military and intelligence | |
| computer in which all information would be divided so that access to one area | |
| did not easily grant access to others, even if security was breached. The goal | |
| is to have these compartmentalized security systems in place by 1992. | |
| On the other hand, one of the most powerful features of modern computers is | |
| that they permit many users to share information easily; this is lost when | |
| security is added. | |
| In 1985 the Defense Department designed standards for secure computer systems, | |
| embodied in the Orange Book, a volume that defines criteria for different | |
| levels of computer security. The National Computer Security Center, a division | |
| of the National Security Agency, is now charged with determining if government | |
| computer systems meet these standards. | |
| But academic and private computer systems are not required to meet these | |
| standards, and there is no federal plan to urge them on the private sector. But | |
| computer manufacturers who want to sell their machines to the government for | |
| military or intelligence use must now design them to meet the Pentagon | |
| standards. | |
| Security weaknesses can also be introduced inadvertently by changes in the | |
| complex programs that control computers, which was the way Morris's program | |
| entered computers in the Arpanet. These security weaknesses can also be | |
| secretly left in by programmers for their convenience. | |
| One of the most difficult aspects of maintaining adequate computer security | |
| comes in updating programs that might be running at thousands of places around | |
| the world once flaws are found. | |
| Even after corrective instructions are distributed, many computer sites often | |
| do not close the loopholes, because the right administrator did not receive the | |
| new instructions or realize their importance. | |
| _______________________________________________________________________________ | |
| Computer Virus Eradication Act of 1988 December 5, 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| The following is a copy of HR-5061, a new bill being introduced in the House by | |
| Wally Herger (R-CA) and Robert Carr (D-Mich.). | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 100th Congress 2D Session H.R. 5061 | |
| To amend title 18, United States Code, to provide penalties for persons | |
| interfering with the operations of computers through the use of programs | |
| containing hidden commands that can cause harm, and for other purposes. | |
| IN THE HOUSE OF REPRESENTATIVES July 14, 1988 | |
| Mr. Herger (for himself and Mr. Carr) introduced the following bill; which was | |
| referred to the Committee on the Judiciary | |
| A BILL | |
| To ammend title 18, United States Code, to provide penalties for persons | |
| interfering with the operations of computers through the use of programs | |
| containing hidden commands that can cause harm, and for other purposes. | |
| - - - | |
| Be it enacted by the Senate and House of Representatives of the United States | |
| of America in Congress assembled, | |
| SECTION 1. SHORT TITLE. | |
| This Act may be cited as the "Computer Virus Eradication Act of | |
| 1988". | |
| SECTION 2. TITLE 18 AMENDMENT. | |
| (A) IN GENERAL.- Chapter 65 (relating to malicious mischief) of | |
| title 18, United States Code, is amended by adding at the end the | |
| following: | |
| S 1368. Disseminating computer viruses and other harmful computer | |
| programs | |
| (a) Whoever knowingly -- | |
| (1) inserts into a program for a computer information or commands, | |
| knowing or having reason to believe that such information or | |
| commands will cause loss to users of a computer on which such | |
| program is run or to those who rely on information processed | |
| on such computer; and | |
| (2) provides such a program to others in circumstances in which | |
| those others do not know of the insertion or its effects; or | |
| attempts to do so, shall if any such conduct affects | |
| interstate or foreign commerce, be fined under this title or | |
| imprisoned not more than 10 years, or both. | |
| (b) Whoever suffers loss by reason of a violation of subsection (a) | |
| may, in a civil action against the violator, obtain appropriate | |
| relief. In a civil action under this section, the court may | |
| award to the prevailing party a reasonable attorney's fee and | |
| other litigation expenses. | |
| (B) CLERICAL AMENDMENT.- The table of sections at the begining of | |
| chapter 65 of title 18, United States Code, is amended by adding at | |
| the end the following: | |
| S 1368. Disseminating computer viruses and other harmful computer | |
| programs. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| NOTE: The above text was typed in by hand from a printed copy of HR5 061. | |
| There is a possibility that there may be typographical errors which | |
| could affect the nature of the bill. | |
| For an official copy of the bill, please contact: | |
| Mr. Doug Riggs | |
| 1108 Longworth Bldg | |
| Washington D.C. 20515 | |
| Information Presented by | |
| Don Alvarez of the MIT Center For Space Research | |
| _______________________________________________________________________________ | |
| Virus Conference In Arlington, Virginia December 5, 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Entitled "Preventing and Containing Computer Virus Attacks", it takes place | |
| January 30-31, in Arlington, VA. Speakers include Representative Wally Herger | |
| (R-CA), a special agent from the FBI, John Landry (ADAPSO virus committee | |
| chairman), Patricia Sission from NASA, as well as a collection of attorneys and | |
| business folk. The conference is chaired by Dave Douglass, no information | |
| provided. It supposedly costs $695. | |
| The address provided is: | |
| United Communications Group | |
| 4550 Montgomery Avenue | |
| Suite 700N | |
| Bethesda, MD 20814-3382 | |
| Information Provided By Gregg Tehennepe | |
| _______________________________________________________________________________ | |
| New York Times Reviews Novel About Computer Sabotage December 7, 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| The Sunday, December 4, 1988 issue of the New York Times Book Review (their | |
| Christmas Books issue) prominently reviews a new novel, 'Trapdoor,' by Bernard | |
| J. O'Keefe. The premise (from the review by Newgate Callender, NYT's crime | |
| fiction reviewer): | |
| "A brilliant American woman of Lebanese descent has developed the computer code | |
| that controls the operation of all our nuclear devices. Turned down for the | |
| job she has sought, convinced male chauvinism is the reason, she is ripe to be | |
| conned by a Lebanese activist. At his suggestion she inserts a virus into the | |
| computer system that in a short time will render the entire American nuclear | |
| arsenal useless. ... The Lebanese President ... demands that Israel withdraw | |
| from the West Bank, or else he will tell the Russians that the United States | |
| will lie helpless for a week or so." | |
| Callender's review begins with the lead sentence, "November 2, 1988, was the | |
| day computers in American went mad, thanks to the 'virus' program inserted by | |
| the now-famous, fun-loving Robert T. Morris, Jr." | |
| Some background on the author, also from the review: | |
| "Bernard J. O'Keefe (is) chairman of the high-tech company EG&G and of an | |
| international task force on nuclear terrorism ... (and is) the author | |
| of a nonfiction book called 'Nuclear Hostages.' O'Keefe says, "I wrote this | |
| parable to point out the complexity of modern technology and to demonstrate | |
| how one error, one misjudgment, or one act of sabotage could lead to actions | |
| that would annihilate civilization."" | |
| Callender also says "...the execution is less brilliant than the idea. The | |
| book has the usual flashbacks, the usual stereotyped characters, the usual | |
| stiff dialogue." | |
| Although the reviewer doesn't say so, the premise of this novel is quite | |
| similar to a 1985 French thriller, published in the U.S. as 'Softwar.' That | |
| novel was also based on the idea that a nation's arsenal could be completely | |
| disabled from a single point of sabotage, although in 'Softwar' it was the | |
| Soviet Union on the receiving end. Popular reviewers of both books apparently | |
| find nothing implausible in the premise. | |
| _______________________________________________________________________________ | |
| Hacker Enters U.S. Lab's Computers December 10, 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Thomas H. Maugh II (Los Angeles Times Service) | |
| A computer hacker has entered computers at the government's Lawrence Livermore | |
| Laboratory in the San Francisco Bay area eight times since last Saturday, but | |
| has not caused any damage and has not been able to enter computers that contain | |
| classified information, Livermore officials said Friday. [Do they ever admit | |
| to anyone gaining access to classified data? -KL] | |
| Nuclear weapons and the Star Wars defense system are designed at Livermore, but | |
| information about those projects is kept in supercomputers that are physically | |
| and electronically separate from other computers at the laboratory. | |
| The hacker, whose identitiy remains unknown, entered the non-classified | |
| computer system at Livermore through Internet, a nationwide computer network | |
| that was shut down at the beginning of November by a computer virus. Chuck | |
| Cole, Livermore's chief of security, said the two incidents apparently are | |
| unrelated. | |
| The hacker entered the computers through an operating system and then through a | |
| conventional telephone line, he gave himself "super-user" status, providing | |
| access to virtually all functions of the non-classified computer systems. | |
| Officials quickly limited the super-user access, although they left some | |
| computers vulnerable to entry in the hope of catching the intruder. | |
| "There has been no maliciousness so far," Cole said. "He could have destroyed | |
| data, but he didn't. He just looks through data files, operating records, and | |
| password files...It seems to be someone doing a joy-riding thing." | |
| _______________________________________________________________________________ | |
| Shattering Revelations December 11, 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~~ | |
| Taken from the RISKS Digest (Edited for this presentation) | |
| [Shatter is a hacker based in England, he is currently accused of breaking into | |
| computers at Massachusetts Institute of Technology. -KL] | |
| (In this article, "IT" seems to refer to the computer community as a whole -KL) | |
| Some of you may have already heard of me via articles in the Wall Street | |
| Journal, New York Times, etc, but for those of you who do not have access to | |
| copies of these newspapers I am a hacker of over 10 years activity who is based | |
| near Nottingham, England [Rumored to be a false statement]. My specialities | |
| are the various packet switched networks around the world such as PSS, Telepac, | |
| Transpac, etc with various forays into UNIX, NOS/VE VMS, VM/SP, CMS, etc. | |
| I feel that as a hacker with so much activity and expirience I am qualified to | |
| make the following points on behalf of the whole hacking community. | |
| Hackers are not the vandals and common criminals you all think we are in fact | |
| most of the "TRUE" hackers around have a genuine respect and love for all forms | |
| of computers and the data that they contain. We are as a community very | |
| responsible and dedicated to the whole idea of IT, but we also have a strong | |
| dislike to the abuse of IT that is perpetrated by various governments and | |
| organizations either directly or indirectly. There is of course a small | |
| minority of so called hackers who do cause trouble and crash systems or steal | |
| money, but these people on the whole are dealt with by other hackers in a way | |
| that most of you could not even think of and most never repeat their "crimes" | |
| again. | |
| The term "HACKER" is still one to be very proud of and I am sure that in days | |
| past, anyone with a computer was called a hacker and they were very proud of | |
| the fact that someone felt that you had a great technical expertise that | |
| warrented the use of the term. However, all of the accusers out there now | |
| suffer from the standard problem that nearly all people involved within IT have | |
| and that is non-communication. You never pass on the information that you pick | |
| up and teach to others within IT [American Government organizations and | |
| Educational Institutes are among the greatest offenders] and this allows the | |
| hacking community [who do communicate] to be at least one step ahead of the | |
| system administrators when it comes to finding security problems and finding | |
| the cause and solution for the problem. | |
| A case in point is the recent Arpanet Worm and the FTP bug. Both these | |
| problems have been known for many months if not years but, when talking to | |
| various system administrators recently, not one of them had been informed about | |
| them and this left their systems wide open even though they had done all they | |
| could to secure them with the information they had. | |
| An interesting piece of information is that hackers in England knew about | |
| Morris's Worm at least 12 hours before it became public knowledge and although | |
| England was not able to be infected due to the hardware in use, we were able to | |
| inform the relevent people and patrol Internet to Janet gateways to look for | |
| any occurance of the Worm and therefore we performed a valuble service to the | |
| computing community in England -- although we did not get any thanks or | |
| acknowledgement for this service. | |
| Hackers should be nurtured and helped to perform what they consider a hobby. | |
| Some people may do crosswords for intelectual challenge -- I study computers | |
| and learn about how things interact together to function correctly (or | |
| incorrectly as the case may be). The use of a group of hackers can perform a | |
| valuable service and find problems that most of you could not even start to | |
| think of or would even have the inclination to look for. | |
| So please don't treat us like lepers and paupers. Find yourself a "TAME" | |
| hacker and show him the respect he deserves. He will perform a valuble service | |
| for you. Above all COMMUNICATE with each other don't keep information to | |
| yourselves. | |
| Bst Rgrds | |
| Shatter | |
| _______________________________________________________________________________ | |
| IBM Sells Rolm To Siemens AG December 14, 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| International Business Machines Corp. (IBM) announced on Tuesday that it was | |
| selling its Rolm telephone equipment subsidiary to West Germany's Siemens AG. | |
| Rolm has lost several hundred million dollars since IBM bought it in 1984 for | |
| $1.5 billion. Rolm was the first, or one of the first companies to market | |
| digital PBX systems. | |
| As most telecom hobbyists already know, the PBX market has been very soft for | |
| years. It has suffered from little or no growth and very bitter price | |
| competition. | |
| Siemens, a leading PBX supplier in Europe wants to bolster its sales in the | |
| United States, and believes it can do so by aquiring Rolm's sales and service | |
| operations. Quite obviously, it will also gain access to some of the lucrative | |
| IBM customers in Europe. | |
| Rolm was an early leader in digital PBX's, but they were surpassed in 1984 by | |
| AT&T and Northern Telecom Ltd. of Canada. Part of the strategy behind IBM's | |
| purchase of Rolm was IBM's belief that small personal computers would be linked | |
| through digital PBX's. Although this has happened, most businesses seem to | |
| prefer ethernet arrangements; something neither IBM or Rolm had given much | |
| thought to. IBM was certain the late 1980's would see office computers | |
| everywhere hooked up through PBX's. | |
| IBM made a mistake, and at a recent press conference they admitted it and | |
| announced that Rolm was going bye-bye, as part of the corporate restructuring | |
| which has seen IBM divest itself of numerous non-computer related businesses in | |
| the past several months. From its beginning until 1984, Rolm could not run | |
| itself very well; now IBM has washed its corporate hands. Time will tell how | |
| much luck the Europeans have with it. | |
| Information Contributed by Patrick Townson | |
| _______________________________________________________________________________ | |
| Virus Invades The Soviet Union December 19, 1988 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| >From The San Francisco Chronicle (P. A16) | |
| (UPI) - The Soviet Union announced on Decemeber 18, 1988 that that so-called | |
| computer viruses have invaded systems in at least five government-run | |
| institutions since August, but Soviet scientists say they have developed a way | |
| to detect known viruses and prevent serious damage. | |
| In August 1988, a virus infected 80 computers at the Soviet Academy of Sciences | |
| before it was brought under control 18 hours later. It was traced to a group | |
| of Soviet and foreign schoolchildren attending the Institute's summer computer | |
| studies program, apparently resulting from the copying of game programs. | |
| Sergei Abramov of the Soviet Academy of Sciences claims they have developed a | |
| protective system, PC-shield, that protects Soviet computers against known | |
| virus strains. It has been tested on IBM computers in the Soviet Union. "This | |
| protective system has no counterpart in the world," he said (although the | |
| details remain a state secret). | |
| _______________________________________________________________________________ | |
| Phrack World News Quicknotes Issue XXII | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| 1. Rumor has it that the infamous John Draper aka Captain Crunch is currently | |
| running loose on the UUCP network. Recently, it has been said that he has | |
| opened up some sort of information gateway to Russia, for reasons unknown. | |
| ------------------------------------------------------------------------------- | |
| 2. Information Available For A Price | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| A company called Credit Checker and Nationwide SS says that anyone can; | |
| o Take a lot of risk out of doing business. | |
| o Check the credit of anyone, anywhere in the United States | |
| o Pull Automobile Drivers License information from 49 states | |
| o Trace people by their Social Security Number | |
| By "Using ANY computer with a modem!" | |
| To subscribe to this unique 24-hour on-line network call 1-800-255-6643. | |
| Can your next door neighbor really afford that new BMW ? | |
| ------------------------------------------------------------------------------- | |
| 3. Reagan Signs Hearing-Aid Compatibility Bill | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| There is new legislation recently passed which requires all new phones to be | |
| compatible with hearing aids by next August. The law requires a small device | |
| to be included in new phones to eliminate the loud squeal that wearers of | |
| hearing aids with telecoils pick up when using certain phones. Importers are | |
| not exempted from the law. Cellular phones and those manufactured for export | |
| are exempt. | |
| _______________________________________________________________________________ | |
| ========================================================================= | |