| == Phrack Inc. == | |
| Volume Three, Issue Thirty-five, File 5 of 13 | |
| ______________________________________________________________ | |
| || || | |
| || Don't let THIS happen to you! || | |
| || || | |
| || __________ || | |
| || Heh | |/No life, no future... || | |
| || /Heh! | 0 H S L Q I F X || | |
| || O | --|-- || | |
| || --|-- | / \ || | |
| || / \ | / \ || | |
| || / \____|____ E N _ R _ P M E N _ || | |
| || Dale ^ || | |
| || Drew | || | |
| || Will this be YOU?! || | |
| ||______________________________________________________________|| | |
| The following is a reprint of the article "Sting Operations" from the book | |
| _Dedicated Computer Crime Units_ (pages 101-103) written by J. Thomas McEwen | |
| for the U.S. Department of Justice and published in June 1989. | |
| If you would like to get your own FREE copy of this book, or its companion | |
| books: | |
| - Organizing for Computer Crime Investigation and Prosecution | |
| - Electronic Fund Transfer and Crime | |
| - Electronic Fund Transfer Fraud | |
| you can contact: | |
| U.S. Department of Justice | |
| Office of Justice Programs | |
| National Institute of Justice | |
| Washington, D.C. 20531 | |
| (301)251-5500 | |
| (800)851-3420 | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| S T I N G O P E R A T I O N S | |
| ~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~ | |
| Will *YOU* Be The Next Victim?! | |
| Transcribed by Sovereign Immunity | |
| ELECTRONIC BULLETIN BOARDS | |
| An electronic bulletin board allows for the storage of information which can be | |
| retrieved by other systems calling into the board. It is essentially a | |
| database maintained by a system that is accessible by others over telephone | |
| lines. Most bulletin boards have been created for specific purposes, usually | |
| for the exchange of messages and information among parties with common | |
| interests. For example, members of computer clubs maintain bulletin boards for | |
| communicating with each other between meetings. | |
| Bulletin boards are especially popular among microcomputer users. | |
| Establishment of a bulletin board is facilitated by programs that can be | |
| purchased or obtained from public domain software. With one of these programs, | |
| a user can establish tailored menus for anyone dialing into the board. These | |
| menus will usually contain options on information about the board, bulletins, | |
| news summaries, personal mail, conferences, and leaving messages. | |
| In addition, most bulletin boards have different levels of access to restrict | |
| users from certain parts of the board. The bulletin board owner, usually | |
| called the System Operator (SYSOP), personally establishes the authorized | |
| access levels for each user and enters this information into the system. | |
| Access is determined by having a user provide their name and password when | |
| signing on to the system. A telephone line into the system is the only other | |
| requirement for establishing a board on a microcomputer. | |
| Access to bulletin boards generally operates along the following lines: | |
| - A user dials into the bulletin board. | |
| - The board responds with a message asking for the person's name and password. | |
| - The board then provides a menu showing the options available to the user. | |
| - The user selects an option and starts interacting with the system. | |
| - During a session, a user typically may read messages, leave messages, | |
| download files, upload files, or join a conference. | |
| - The user eventually "quits" the session and hangs up from the board. | |
| While most bulletin boards have been established for legitimate purposes, there | |
| are also "pirate" or "elite" boards that contain illegal information or have | |
| been established to advance an illegal activity. Security on those boards is | |
| tightly controlled by the owners. With these bulletin boards, users usually | |
| have to contact the owner directly to obtain a password for access to different | |
| levels of the system. A degree of trust must therefore be established before | |
| the owner will allow access to the board, and the owners develop "power" over | |
| who can use the system. | |
| Pirate boards have been found with a variety of illegal information on them | |
| including the following: | |
| - Stolen credit card account numbers | |
| - Long distance telephone service codes | |
| - Telephone numbers to mainframe computers, including passwords and account | |
| numbers | |
| - Procedures for making illegal drugs | |
| - Procedures for making car bombs | |
| - Hacking programs | |
| - Tips on how to break into computer systems | |
| - Schematics for electronic boxes (e.g., black box) | |
| These boards obviously are a threat to communities, and their existence has | |
| gained the attention of some police departments. | |
| STING OPERATIONS WITH BULLETIN BOARDS | |
| The experiences of the Maricopa County, Arizona, Sheriff's Department and the | |
| Fremont, California, Police Department are very instructive on how local | |
| departments can establish their own bulletin boards and become part of the | |
| network with other boards. Members of the Maricopa County Sheriff's Department | |
| were the first in the country to establish such a board. Their board resulted | |
| in over 50 arrests with the usual charge being telecommunications fraud. | |
| In September, 1985, the Fremont Police Department established a bulletin board | |
| for the primary purpose of gathering intelligence on hackers and phreakers in | |
| the area. The operation was partially funded by VISA, Inc. with additional | |
| support from Wells Fargo Bank, Western Union, Sprint, MCI, and ITT. | |
| After establishing their bulletin board, they advertised it on other boards as | |
| the newest "phreak board" in the area. Within the first four days, over 300 | |
| calls were received on the board. During the next three months, the board | |
| logged over 2,500 calls from 130 regular users. Through the bulletin board, | |
| they persuaded these groups that they had stolen or hacked long-distance | |
| telephone service codes and credit account numbers. They were readily accepted | |
| and were allowed access to pirate boards in the area. | |
| The board was operated for a total of three months. During that period, over | |
| 300 stolen credit card numbers and long-distance telephone service codes were | |
| recovered. Passwords to many government, educational, and corporate computers | |
| were also discovered on other boards. | |
| The operation resulted in the apprehension of eight teenagers in the area who | |
| were charged with trafficking in stolen credit card accounts, trafficking in | |
| stolen long-distance telephone service codes, and possession of stolen | |
| property. Within the next week, seven more teenagers in California and other | |
| states were arrested on information from this operation. | |
| It was established that this group had been illegally accessing between ten and | |
| fifteen businesses and institutions in California. They were regularly | |
| bypassing the security of these systems with stolen phone numbers and access | |
| codes. One victim company estimated that it intended to spend $10,000 to | |
| improve its security and data integrity procedures. Other victimized | |
| businesses were proceeding along the same lines. | |
| CONCLUSIONS | |
| There are several reasons for conducting Sting operations of this type. One of | |
| the most important is that it provides a proactive method of identifying | |
| hackers and phreakers in the area. These groups are particularly hard to find | |
| since they operate in closed circles with personal networks developed from | |
| friendships. | |
| Another byproduct of these operations is the publicity surrounding the cases. | |
| Sting operations result in considerable amount of attention from the media. | |
| The publicity has the effect of closing down other pirate boards in the area. | |
| One of the greatest fears of these offenders in that their systems will be | |
| taken, and in the Fremont operation over $12,000 of computer equipment was | |
| seized. The publicity associated with these seizures seems to be the primary | |
| reason for others to stop their pirate boards. | |
| These operations also lead to other types of offenses. In Fremont, for | |
| example, drug and alcohol cases were developed as a result of the Sting | |
| operation. This has been typical of these operations. | |
| The Sting operations with bulletin boards have been criticized because | |
| teenagers, rather than hardened criminals, are arrested. Many hackers believe | |
| that they have a right to the data in other systems and that their activities | |
| are not illegal since the companies can afford the losses. On the other hand, | |
| as one investigator observed, the hackers of today may be the sophisticated | |
| computer criminals of tomorrow. It is therefore important to set a lesson | |
| early in their careers steering them away from these offenses. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| RESPONSE FROM A MEMBER OF THE HACKER COMMUNITY: | |
| Now lets take a look at this article and the ignorant author J. Thomas | |
| McEwen. | |
| "Pirate boards have been found with a variety of illegal | |
| information on them..." | |
| The author names: | |
| "Telephone numbers to mainframe computers" -- There is nothing illegal in | |
| having the telephone number to a mainframe computer. It is illegal to access a | |
| computer without authorization. | |
| "Procedures for making illegal drugs" -- It is NOT illegal to know how to | |
| manufacture illegal drugs, only to actually manufacture or use them. | |
| "Procedures for making car bombs" -- It is NOT illegal to know how to | |
| manufacture car bombs, only to actually manufacture or use them. | |
| "Hacking programs" -- Indeed most security companies, private security | |
| consultants, or mainframe owners and operators use these to test their systems | |
| very often. It would only be illegal to use one on a machine that you are not | |
| authorized to use it on. | |
| "Tips on how to break into computer systems" -- Again, it is NOT illegal to | |
| know how to break into a computer... although for a change, according to a | |
| section of the Computer Fraud & Abuse Act of 1986 (Federal Law), it would be | |
| illegal to traffic in passwords, codes, and theoretically any instructions that | |
| would be the equivalent of passwords or codes for the unauthorized entry into | |
| computer systems. | |
| "Schematics for electronic boxes (e.g., black box)" -- This is getting boring. | |
| It is NOT illegal to know how to build these devices, only the actual | |
| construction or use of them is illegal. | |
| "These boards obviously are a threat to communities, and their | |
| existence has gained the attention of some police departments." | |
| How are they obviously a threat? | |
| The author would like us to believe that if the information on how to make | |
| telephone devices, explosives, or narcotics is available on bulletin boards, | |
| this is enough to make them a threat to communities. | |
| What he ignores is that the same information can be found in public and | |
| university libraries, text books, and technical journals; | |
| He ignores that the mere possession of information on how a crime MIGHT be | |
| committed is NOT a crime; and finally, | |
| He fails to recognize any First Amendment rights whatsoever of computer | |
| bulletin boards to have all such information to begin with. | |
| "It is therefore important to set a lesson early in the careers | |
| steering them away from these offenses." | |
| Of course an arrest for some minor computer mischief is not going to be great | |
| resume material when these teenagers start applying for jobs, even though the | |
| establishment has inspired within them the socially acceptable goal of | |
| conforming to society's expectations. | |
| CONCLUSIONS | |
| The author, J. Thomas McEwen, does not know much about freedom of speech and | |
| for that matter, he does not know much about the law. He does know a lot about | |
| how to sensationalize very benign conduct into dangerous conspiracy. Perhaps | |
| he is close friends with Geraldo Rivera. | |
| Bulletin board operators and users take note of the law and your rights. Don't | |
| let yourself get taken in by Sting boards or ignorant law enforcement officers | |
| looking for some gratification on the job since they aren't getting it at home. | |
| S o v e r e i g n I m m u n i t y | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Editor's Comments by: Dispater | |
| Sting boards have been a popular topic in Phrack and Phrack World News over the | |
| years. In this file, Sovereign Immunity, showed us an excerpt that discussed a | |
| Sting bulletin board in Fremont, California. As it turns out, Knight Lightning | |
| had some material about this way back in Phrack World News Issue 3 (which | |
| actually appeared in Phrack Issue 4). The article was titled "Phoenix | |
| Phortress Stings 7." There have also been many other articles in Phrack World | |
| News about sting operations and bulletin boards. | |
| Additionally, Phrack Issues 21-23 each carried one part of Knight Lightning's | |
| "Vicious Circle" Trilogy. The first two parts of which ("Shadows Of A Future | |
| Past" and "The Judas Contract") contained a lot of material about sting boards | |
| and informants. | |
| Although Phrack has not presented material concerning Sting boards in Maricopa | |
| County, Arizona, there was discussion about a bulletin board (The Dark Side) in | |
| Arizona (602) run by "The Dictator" (Dale Drew) as a sting operation revealed | |
| in Computer Underground Digest 3.02 and recently we heard that he was back in | |
| action under the name "Blind Faith." | |
| Dispater | |
| _____________________________________________________________________________?_ | |