| ==Phrack Inc.== | |
| Volume Three, Issue Thirty-one, Phile #9 of 10 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN Phrack World News PWN | |
| PWN Issue XXXI, Part Two PWN | |
| PWN Compiled by Phreak_Accident PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| {C}omputer {E}mergency {R}esponse {T}eam | |
| ---------------------------------------- | |
| Some call it "Internet Police" -- Others call it "just stupid." | |
| CERT however is a mix. But I do give them credit -- After all, have your | |
| number one goal being 'making the Internet more secure' has to be a tough task. | |
| Therefore, we give them credit. | |
| However, CERT is funded by DARPA, which is a government agency. And | |
| anything in my book that the government runs is bad news. Yes, the government | |
| pays the 6 man salary and keep their hot-line active 24 hours a day. | |
| Ahh.. What do you know about CERT? "Nothing" you say? Well, the | |
| following is the press release and other reprints of information about CERT. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Richard Pethia <rdp@SEI.CMU.EDU> | |
| DEAR XXXXXXXXX, | |
| I have been reviewing our correspondence files and have discovered | |
| that your request for information may not have been filled. I | |
| apologize for the delay and hope that the information is still useful | |
| to you. If, after reading the following, you have additional | |
| questions or would like to subscribe to one of our information lists, | |
| please send email with your question/request. | |
| The Computer Emergency Response Team (CERT) was established by the Defense | |
| Advanced Research Projects Agency in November of 1988 to serve members | |
| of the Internet Research community. The press release below describes | |
| the general role of the CERT. | |
| More specifically, the CERT supports individual Internet sites by: | |
| -Working with site personnel to help resolve individual computer security | |
| incidents. Contact potentially affected sites to warn them of | |
| possible security breaches. Work with sites to change the | |
| conditions that allowed incidents to occur. | |
| -Issuing advisories that alert the community to specific system | |
| vulnerabilities or intrusion techniques, as well as the methods to | |
| protect against them. | |
| -Working with the community and system (primarily Unix) vendors to | |
| reslove specific system vulnerabilities. | |
| -Maintaining and operating moderated mailing lists that: (1) provide a | |
| discussion forum for tools and techniques to improve the security of | |
| Unix systems, and (2) provide a discussion forum and alert mechanism | |
| for PC viruses, trojan horses, etc. | |
| Over the past year we have developed hundreds of working relationships | |
| with members of the Internet and other communities and have | |
| established an extensive information collection and dissemination | |
| network. Because of this network of cooperating individuals and | |
| organizations, we are often able to advise the community of problems | |
| allowing them to take corrective action before being affeceted by | |
| those problems. | |
| --------------------- | |
| No. 597-88 | |
| (202) 695-0192 (Info.) | |
| (202) 697-3189 (Copies) | |
| IMMEDIATE RELEASE December 6, 1988 (202) 697-5737 | |
| (Public/Industry) | |
| DARPA ESTABLISHES COMPUTER EMERGENCY RESPONSE TEAM | |
| The Defense Advanced Research Projects Agency (DARPA) announced today | |
| that it has established a Computer Emergency Response Team (CERT) to | |
| address computer security concerns of research users of the Internet, | |
| which includes ARPANET. The Coordination Center for the CERT is | |
| located at the Software Engineering Institute (SEI), Carnegie Mellon | |
| University, Pittsburgh, PA. | |
| In providing direct service to the Internet community, the CERT will | |
| focus on the special needs of the research community and serve as a | |
| prototype for similar operations in other computer communities. The | |
| National Computer Security Center and the National Institute of | |
| Standards and Technology will have a leading role in coordinating the | |
| creation of these emergency response activities. | |
| The CERT is intended to respond to computer security threats such as | |
| the recent self-replicating computer program ("computer virus") that | |
| invaded many defense and research computers. | |
| The CERT will assist the research network communities in responding to | |
| emergency situations. It will have the capability to rapidly | |
| establish communications with experts working to solve the problems, | |
| with the affected computer users and with government authorities as | |
| appropriate. Specific responses will be taken in accordance with | |
| DARPA policies. | |
| It will also serve as a focal point for the research community for | |
| identification and repair of security vulnerabilities, informal | |
| assessment of existing systems in the research community, improvement | |
| to emergency response capability, and user security awareness. An | |
| important element of this function is the development of a network of | |
| key points of contact, including technical experts, site managers, | |
| government action officers, industry contacts, executive level | |
| decision-makers and investigative agencies, where appropriate. | |
| Because of the many network, computer, and systems architectures and | |
| their associated vulnerabilities, no single organization can be | |
| expected to maintain an in-house expertise to respond on its own to | |
| computer security threats, particularly those that arise in the | |
| research community. As with biological viruses, the solutions must | |
| come from an organized community response of experts. The role of the | |
| CERT Coordination Center at the SEI is to provide the supporting | |
| mechanisms and to coordinate the activities of experts in DARPA and | |
| associated communities. | |
| The SEI has close ties to the Department of Defense, to defense and | |
| commercial industry, and to the research community. These ties place | |
| the SEI in a unique position to provide coordination support to the | |
| software experts in research laboratories and in industry who will be | |
| responding in emergencies and to the communities of potentially | |
| affected users. | |
| The SEI is a federally-funded research and development center, | |
| operating under DARPA sponsorship with the Air Force Systems Command | |
| (Electronic Systems Division) serving as executive agent. Its goal is | |
| to accelerate the transition of software technology to defense | |
| systems. Computer security is primarily a software problem, and the | |
| presence of CERT at the SEI will enhance the technology transfer | |
| mission of the SEI in security-related areas. | |
| -END- | |
| QUESTIONS AND ANSWERS: DARPA ESTABLISHES CERT, 12/6/88 | |
| Q: Can you provide background on earlier break-ins? | |
| A: On November 2, 1988, thousands of computers connected to | |
| unclassified DoD computer networks were attacked by a virus. Although | |
| the virus did not damage or compromise data, it did have the effect of | |
| denying service to thousands of computer users. The computer science | |
| research community associated with the Defense Advanced Research | |
| Projects Agency (DARPA), along with many other research laboratories | |
| and military sites that use these networks, quickly responded to this | |
| threat. They developed mechanisms to eliminate the infection, to | |
| block the spread of the self-replicating program, and to immunize | |
| against further attack by similar viruses. Software experts from the | |
| University of California at Berkeley, with important contributions | |
| from the Massachusetts Institute of Technology and other network | |
| sites, rapidly analyzed the virus and developed immunization | |
| techniques. These same software experts also provided important | |
| assistance in the more recent Internet intrusion of 27-28 November. | |
| As the events unfolded, DARPA established an ad hoc operation center | |
| to help coordinate the activities of software experts working around | |
| the clock and to provide information to appropriate government | |
| officials. The operations center had three main tasks. It | |
| facilitated communications among the many groups affected, it ensured | |
| that government organizations were promptly informed of developments, | |
| and it provided initial technical analysis in DoD. Although the | |
| threat was contained quickly, a more maliciously designed virus could | |
| have done serious damage. | |
| The recent events serve as a warning that our necessarily increasing | |
| reliance on computers and networks, while providing important new | |
| capabilities, also creates new kinds of vulnerabilities. The | |
| Department of Defense considers this an important national issue that | |
| is of major concern in both the defense and commercial sectors. The | |
| DoD is developing a technology and policy response that will help | |
| reduce risk and provide an emergency reaction response. | |
| Q: Who will be on the CERT? | |
| A: The CERT will be a team of over 100 experts located throughout the | |
| U.S. whose expertise and knowledge will be called upon when needed. | |
| When not being called upon, they will continue their normal daily | |
| work. As noted in the release, these experts will include: technical | |
| experts, site managers, government action officers, industry contacts, | |
| executive-level decision-makers and representatives from investigative | |
| agencies. | |
| recommendations that will be acted upon by DoD authorities. | |
| Q: Is the CERT fully operational now? | |
| A: We are in the very early stages of gathering people for the CERT. | |
| We are first concentrating on collecting technical experts. A staff | |
| is in place at SEI, but details are still being worked out. | |
| Q: Will there just be one CERT? | |
| A: The intent is that each major computer community may decide to | |
| establish its own CERT. Each CERT will therefore serve only a | |
| particular community and have a particular technical expertise. (The | |
| DARPA/SEI CERT will serve, for example, the research community and | |
| have expertise in Berkeley-derived UNIX systems and other systems as | |
| appropriate.) The National Computer Security Center and the National | |
| Institute of Standards and Technology will support the establishment | |
| of the CERTs and coordinate among them. | |
| Q: What are the special needs of the research community that their | |
| CERT will serve? | |
| A: The special challenge of the research community is improving the | |
| level of computer security without inhibiting the innovation of | |
| computer technology. In addition, as is often DARPA's role, their | |
| CERT will serve as a prototype to explore the CERT concept so that | |
| other groups can learn and establish their own. | |
| Q: Does the CERT Coordination Center have a press point of contact? | |
| A: No. Their function is to serve as a nerve center for the user | |
| community. | |
| .end | |
| _______________________________________________________________________________ | |
| USA Today and the devil | |
| ----------------------- | |
| Many controversies have been made of the article printed in USA Today | |
| after Operation Sun-Devil took it's toll. | |
| Phrack inc. tried to contact the author, and with no luck she wasn't | |
| accepting phone calls. Please remember, this is only a USA Today article -- | |
| C'mon, get real USAT. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| byline 'Debbie Howlett, USA Today' reads: | |
| A network of computer hackers operating in 14 cities -- which bilked phone | |
| companies of $50 million -- has been unplugged, police say. | |
| "We're not talking about somebody who played Space Invaders too many | |
| times," says Tim Holtzen, spokesman for the U.S. attorney in Phoenix. | |
| The hackers -- the largest such ring discovered in the USA --broke into | |
| phone company and bank computer systems to obtain account numbers and run | |
| up an unknown total in debts, police say. | |
| "The main thing is the life-threatening information these computer hackers | |
| were trying to get into," says Richard Adams of the Secret Service. "It | |
| goes beyond being monetary to totally mischievous." | |
| The ring was uncovered 18 months ago, when members tried and failed to | |
| infiltrate computers at Barrows Neurological Institute in Phoenix. | |
| They later tried to block incoming calls to the 911 emergency service in | |
| Chicago. The motivation? "The primary reason is as kind of a malicious | |
| hobby." says Gary Chapman of Computer Professionals for Social | |
| Responsibility. "People are interested in testing their skills against | |
| security measures." But, Adams says, "I hate to minimize it by saying it | |
| was just for kicks." | |
| Police seized 40 computers and 23,000 disks during searches Tuesday in 14 | |
| cities, officials said Wednesday. Five men, between the ages of 19 and 24, | |
| have been arrested. | |
| What's been uncovered so far, says Holtzen, may be "just the tip of the | |
| iceberg." | |
| [END OF STORY] | |
| _______________________________________________________________________________ | |