| ==Phrack Inc.== | |
| Volume Four, Issue Forty, File 12 of 14 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Issue 40 / Part 1 of 3 PWN | |
| PWN PWN | |
| PWN Compiled by Datastream Cowboy PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Scantronics BBS Seized By San Diego Police Department July 1, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Knight Lightning and The Gatsby | |
| Special Thanks to Bruce Bigelo (San Diego Union-Tribune) | |
| "Multiplexor and The Crypt Keeper Spill Guts" | |
| A lot of stories have been circulating in the press over the past two months | |
| about hordes of credit card stealing computer hackers that were disrupting | |
| the economy of the United States. It all began with rumors about Multiplexor, | |
| a small time hacker that was thought to have spent some time in Long Island, | |
| New York and supposedly is from Indiana. The story was that Multiplexor had | |
| carded a plane ticket to San Diego to see a girl or meet some friends, but | |
| when he landed, he was met by the police instead. | |
| Where that information or the supposed "1,000 member hacker ring" theory came | |
| from, we might never know, but we know do know the facts in this case thanks | |
| to police reports and warrant affidavits supplied by the court and acquired by | |
| The Gatsby with help. | |
| That information and more is now available. | |
| For purposes of understanding the following, "SEMENICK" and "MARCOV" are both | |
| the same person. You might know him better under the names of Multiplexor or | |
| The Prisoner. Later in this file, you will see references to a person named | |
| Kevin Marcus who is better known to some as The Crypt Keeper. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| SAN DIEGO POLICE DEPARTMENT | |
| Investigators Follow-Up Report | |
| CASE NUMBER: N/A | |
| DATE: March 23, 1992 | |
| TIME: 1300 Hours | |
| SUBJECT: Damage Assessment of and Intelligence gathering on Illegal entry | |
| (Hacking) Computer Systems and the Illegal use of Credit Cards. | |
| SUSPECT: SEMENICK, John Edward AKA: MARCOV, Eric Edward | |
| VICTIM: Zales Jewelry Store | |
| LOCATION: 4465 La Jolla Village Drive, San Diego, CA | |
| DETECTIVE: Dennis W. Sadler (I.D.# 2486) | |
| On March 31, 1992, I received a ARJIS 4 form from Officer Smyth (I.D.# 3871) | |
| regarding some papers found by a Mr. Maurice Osborne at his residence. | |
| Mr. Osborne had asked an individual by the name of Eric MARCOV, who had rented | |
| a room from him, to leave. After MARCOV left the house, Mr. Osborne discovered | |
| some papers with what appeared to be credit card information on them. Mr. | |
| Osborne called the police and reported what he found. | |
| Officer Smyth collected the papers and wrote the attached report. After | |
| reviewing these papers, I learned that they did in fact contain some personal | |
| information on individuals which included the person's name, address, credit | |
| card number, card expiration date, and social security number. It appeared | |
| that the person who wrote these notes was possibly using this credit card | |
| information illegally. | |
| I contacted Mr. Osborne by phone on March 31st. He verified the contents of | |
| the report and he stated that he feels MARCOV may still be in town. On April | |
| 2nd, I was contacted by Mr. Osborne who learned that MARCOV was staying at a | |
| motel in the beach area named Sleepy Time. | |
| On April 2, 1992, while in the beach area, I came across the Sleepy Time Motel. | |
| I contacted the motel manager, William Gainok. I asked Mr. Gainok if he had | |
| a person registered there by the name of Eric MARCOV. He said that he did and | |
| that Marcov was in room number 108. | |
| At approximately 8:40 am, I knocked on the door to room number 108. A white | |
| male answered the door. I asked him if he was Eric MARCOV. He said yes. I | |
| identified myself as a San Diego Police Detective and told him that I needed | |
| to talk to him about some questionable credit card activity. | |
| As he opened the motel room door, I saw more papers like <those> given to me by | |
| Mr. Osborne laying on the floor near the door with more credit card information | |
| on them. After being invited into the motel room, I asked MARCOV if he knew | |
| why I was here. He said I think so. I asked MARCOV why he thought so. He | |
| said the credit cards. | |
| At this point, I was only interviewing MARCOV regarding the papers found at Mr. | |
| Osborne's residence. I had no active case or any evidence indicating that | |
| MARCOV was involved in, or a suspect of any criminal or illegal activity. | |
| I asked MARCOV if he had any I.D. on him. He said that he did not. MARCOV | |
| gave me the following information; Eric Edward MARCOV, DOB 05-15-74, then | |
| changed the year to 73. He said he was 18 going on 19. He did not know his | |
| social security number. When asked if he had a drivers' license, he said that | |
| he has never had one. MARCOV appeared to be between the age of 17 to 19 years | |
| old. | |
| While asking him about papers, he started talking about computers and gaining | |
| information from various systems. He talked for about 10 minutes. After that, | |
| I decided to call the FBI because hacking was involved in obtaining the credit | |
| card information and numbers, plus the information was coming from out of | |
| state. MARCOV also sounded like he knew a lot about computer hacking and was | |
| involved in it himself. | |
| At 8:58 am, I called the local office of the FBI and told them what I had and | |
| asked if they would be interested in talking with MARCOV. I asked MARCOV prior | |
| to calling the FBI, if he would be willing to talk with them about his computer | |
| activities. He agreed to talk with them. | |
| A short later Special Agent Keith Moses called me back at the motel. I | |
| explained to him what I had and what MARCOV was willing to talk about. After | |
| going over the case with Moses, he agreed to come out and talk with MARCOV. | |
| Both Moses and I interviewed MARCOV regarding his hacking activities and | |
| knowledge. MARCOV was extensively involved in the hacking community during | |
| the last four years and had some superior knowledge about what was happening in | |
| the hacker world. We later learned that he had been arrested for computer | |
| crimes in early 1991 in Indianapolis. We attempted to contact the | |
| investigators that worked that case, but we never received any calls back after | |
| numerous attempts. | |
| During the interview, I attempted to confirm MARCOV's true identity. I asked | |
| him for his parents' information. He said he did not remember their home phone | |
| numbers, but they had a phone. He also could not remember their home | |
| addresses. I asked him for his parents' employment information. He said that | |
| his father worked for a local (his home town) turbine company. | |
| I called the information number for the local phone company and then called the | |
| company to verify this information. However, the company's personnel office | |
| could not locate any employee matching the name given to me by MARCOV. MARCOV | |
| also gave me the school and year he graduated. I called the local school | |
| district's administrative office and discovered they had no record of MARCOV | |
| attending or graduating from their school system. | |
| I confronted him with this information and he finally gave me his true | |
| information. His true name was John Edward SEMENICK, DOB 05-15-75. I located | |
| his father's work number and contacted him. He was very uninterested about his | |
| son's whereabouts or condition. When asked if he would supply an airline or | |
| bus ticket for transportation home, he said he would not. His father further | |
| stated that when his son decided to come home, he'll have to find his own way. | |
| SEMENICK's parents are divorced and he lives with his father. However, we | |
| learned that his mother had filed a runaway report with the local sheriff's | |
| office. | |
| I contacted his mother and she seemed a little more concerned, but said she | |
| would not provide a ticket or funds for his return. I asked both parents if | |
| while John was in San Diego would they have any problems if their son assisted | |
| us in our investigation. I explained to them that he was not facing any known | |
| criminal charges at that point and that the information he would be giving us | |
| would be for damage assessment and intelligence gathering purposes on hackers | |
| Both parents stated that they had no problem with him assisting us if he was | |
| not being charged. Because SEMENICK was a juvenile and a runaway report was | |
| filed on him, we contacted the U.S. Attorney's office, the District Attorney's | |
| Juvenile Division, and the Juvenile Hall Probation Intake Officer for advice. | |
| They advised us that their was no problem with him giving us information. | |
| SEMENICK was booked into Juvenile hall as a runaway and then released to a | |
| halfway home for the evening. The intake officer explained to us that because | |
| his parents would not send for him, they would only keep him for one evening | |
| and then he would be let go on his own again the next day. | |
| After SEMENICK went through the runaway process and was being released, we | |
| picked him back up. The FBI agreed and furnished the fund's to put SEMENICK up | |
| in a hotel, give him living expenses, and then provide transportation for him | |
| home. SEMENICK was put up in a suite at the Mission Valley Marriott. He was | |
| allowed to do what he wanted while staying at the hotel and to see his friends | |
| at any time. | |
| During SEMENICK's stay at the Marriott, either myself or Agent Moses stayed in | |
| the hotel room next to SEMENICK's. During the three day stay at the hotel, | |
| SEMENICK was able to provide us with some very useful information and | |
| intelligence. It was not enough to make any arrest, but we obtained some very | |
| valuable information. We were not able to independently verify the information | |
| by another source. | |
| During the period of April 3rd to April 5th, 1992, SEMENICK contacted numerous | |
| persons by phone who were involved in computer hacking. SEMENICK willingly and | |
| voluntarily signed an FBI consent form giving us permission to record his phone | |
| calls during the course of our investigation. There were numerous tape | |
| recorded phone conversations involving at least 4 separate individuals. | |
| During this same period of time, information in data format was also downloaded | |
| from another individual's computer located on the East Coast to the computer | |
| we had set up. The information we received during the download was current | |
| credit records just obtained from CBI credit reporting company by this person, | |
| a CBI manual written in part by "Kludge" a San Diego hacker, and numerous | |
| other files/documents involving illegal activity such as "carding." "Carding" | |
| is a term used by the hacker community regarding the illegal or fraudulent use | |
| of credit cards or credit card numbers by hackers nationwide. | |
| SEMENICK stated that he had been a member of a local BBS called Scantronics | |
| when he was an active hacker. He stated that the board is run by a guy named | |
| "KLUDGE" and contains hundreds of files and documents. He said that most of | |
| these files and documents contained on "KLUDGE's" computer are "how to" | |
| manuals. This means that they instruct the person who obtains them through | |
| Scantronics BBS on how to do various things both legal and illegal. Some of | |
| the illegal activities that are covered on this BBS is carding, phone hacking, | |
| ATM fraud, and credit bureau information. | |
| We obtained three documents written by or put out by either "KLUDGE" or | |
| Scantronics BBS. | |
| THIS INVESTIGATION IS ONGOING AT THIS TIME AND FURTHER INFORMATION AND EVIDENCE | |
| WILL BE ADDED. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| SAN DIEGO POLICE DEPARTMENT | |
| Investigators Follow-Up Report | |
| CASE NUMBER: N/A | |
| DATE: April 30, 1992 | |
| TIME: 0700 Hours | |
| SUBJECT: Computer Hacking | |
| SUSPECT: N/A | |
| VICTIM: N/A | |
| LOCATION: N/A | |
| DETECTIVE: Dennis W. Sadler (I.D.# 2486) | |
| On April 16, 1992, I was contacted by Kevin Marcus. Marcus learned that we | |
| were investigating individuals who were illegally logging (hacking) into | |
| various computer systems nationwide. Marcus runs a local computer bulletin | |
| board system (BBS) called The Programmer's Paradise. Marcus was concerned | |
| about the illegal activities had had seen on various local BBSs and contacted | |
| me. | |
| Marcus also said that he had received computer messages from a person who goes | |
| by the name (handle) of Knight Lightning in New York who asked him if he heard | |
| anything about our investigation. Knight Lightning told Marcus that on April | |
| 3rd a reporter from San Diego by the name of Bigelo had contacted and talked to | |
| him about our ongoing investigation. | |
| -- -- -- -- -- -- -- -- | |
| Enclosure 1: | |
| Date: Fri, 10 Apr 1992 18:14:11 -500 | |
| To: knight@eff.org | |
| From: Craig Neidorf <knight@eff.org> | |
| Subject: Runaway Teen Hacker Picked Up? | |
| I was just contacted by a reporter in San Diego about a hacker case. | |
| Apparently there is a teenage hacker from Indiana who ran away from home to | |
| California to see some girl there. The local police and the FBI supposedly | |
| picked him up on April 3rd and he remains in their custody uncharged while he | |
| is telling them all sorts of information on hacker rings across the nation. | |
| Does anyone have any clues as to who this kid is or what's going on? | |
| :Knight Lightning | |
| -- -- -- -- -- -- -- -- | |
| Enclosure 2: | |
| Date: Thu, 16 Apr 1992 22:25:17 -0400 | |
| From: Craig Neidorf <knight@eff.org> | |
| To: tck@netlink.cts.com | |
| Subject: Re: Hi. | |
| Bruce Bigelo, Union Tribune. Left his number at the office. Nothing going on, | |
| but I understand that you called him. | |
| Craig | |
| -- -- -- -- -- -- -- -- | |
| Marcus offered to assist us. I asked if he knew of a BBS called Scantronics. | |
| He said that he did and that he had been a member of that BBS and view the | |
| files on that board in the past to see what the board carried. Marcus is a | |
| computer science major at a local college and is doing research in the anti- | |
| virus field. Marcus stated that the board carried a lot of technical data, but | |
| had nothing regarding his subject. Marcus also belongs to other local and out- | |
| of-state BBSs where he talks with other individuals with his same interest. | |
| Marcus stated that he was last on Scantronics BBS about a month ago and he had | |
| seen numerous computer files that involved CBI and carding. Carding is a term | |
| used by hackers who are involved in the illegal or fraudulent use of credit | |
| cards and their numbers. These credit card numbers are obtained from credit | |
| reporting companies such as CBI and TRW, by illegally accessing (hacking) their | |
| way into those company computers and reading or copying private individuals | |
| credit reports and information. | |
| Most copies of credit reports from these companies will show a person's name, | |
| current and previous addresses, social security number, employer, salary, and | |
| all current credit history including all credit cards and their account | |
| numbers. They <the hackers> then use these credit card numbers to obtain | |
| goods. | |
| If one of the hackers used an account number he found on a credit report that | |
| he illegally pulled from the credit reporting company, the victim would most | |
| likely not find out that their card had been illegally used until the next | |
| billing cycle which could be as much as 45 days after the illegal transaction | |
| took place. According to the credit card industry, this is one of the most | |
| risk free and safest way to commit credit card fraud. | |
| Marcus said that the person's name who ran this BBS was Jeremy. He did not | |
| know his last name, but the handle he is known by is "KLUDGE." I asked if he | |
| knew the phone number to this BBS and he gave me 423-4852. The BBS phone | |
| number, the operator's first name, and <the operator's> handle matched the | |
| information we had learned earlier. | |
| Marcus also gave me two disks <that> contained some files which had been | |
| downloaded (left on his BBS) by other persons on his system. He regularly | |
| checks his board and removes or deletes files regarding questionable or illegal | |
| activity such as carding. | |
| I viewed both of these disks and they contained some very interesting files. | |
| These files included various topics <such as> an auto theft manual, CBI manual, | |
| TRW manual, American Express card info, and many other files which if | |
| downloaded or copied by another person, that person could easily gain illegal | |
| access to various credit reporting companies and commit various other illegal | |
| types of activity. | |
| I told Marcus if he came across any further information regarding this type of | |
| activity or further information about the BBS called Scantronics to please | |
| contact me. | |
| On April 17, 1992, I met Marcus and he said that he had logged onto Scantronics | |
| last night by using an access number a friend gave him. This same friend had | |
| let him use his access number to gain access to this BBS on many prior | |
| occasions. He did this on his own, without any direction whatsoever from me or | |
| any other law enforcement official. | |
| Marcus handed me a 5 1/4" computer disk and said that it contained some file | |
| listings and a list of all validated users. Marcus also stated that the disk | |
| contained a copy of the messages that were sent to him through his BBS by the | |
| person in New York regarding our investigation [those messages displayed above | |
| from Knight Lightning]. | |
| He asked me if I wanted him to log on and see for myself what was on "KLUDGE's" | |
| BBS. I told him that I would have to consult with the D.A.'s office first. | |
| However, I was unable to get a hold of our D.A. liaison. I told <Marcus> that | |
| I'd get back with him later. | |
| After talking to D.A. Mike Carlton, I advised Marcus not to go into Scantronics | |
| BBS unless it was for his own information. However he said that if he came | |
| across any further information during his normal course of running his own BBS, | |
| he would notify me. | |
| -- -- -- -- -- -- -- -- | |
| [The police report also contained 60 pages of printouts of postings and text | |
| files found on Scantronics BBS. It is also made very clear that Kevin Marcus | |
| (aka The Crypt Keeper) accessed Scantronics BBS by using the password and | |
| account number of The Gatsby. Files include: | |
| - "Credit Bureau Information" which sounds harmless enough to begin with and | |
| turns out is actually a reprint of an article from the September 27, 1992 | |
| issue of Business Week Magazine | |
| - "Advanced Carding" by The Disk Jockey, which dates back to 1987. | |
| - "The Complete CBI Manual of Operations" by Video Vindicator and Kludge, | |
| dated October 10, 1991. | |
| Aftermath | |
| ~~~~~~~~~ | |
| On April 23, 1992, a search warrant was issued in the municipal court of the State of California in the county of San Diego which authorized the seizure of: | |
| A. All telephone company subscriber information to include service start date, | |
| copy of most current billing statement, current credit information, and | |
| location of telephone service to the following telephone numbers; | |
| (619)XXX-XXXX and (619)XXX-XXXX and any other telephone number information | |
| in any chain of call forwarding, to or from the listed phone numbers. | |
| B. All telephone company records which includes subscriber information, | |
| service start date, copy of most current billing statement, current credit | |
| information, and location of telephone service phone numbers to which calls | |
| are being forwarded to or from, from the listed phone numbers. | |
| CERTIFICATION TO DEFER NOTIFICATION TO SUBSCRIBER | |
| The Court finds there is substantial probable cause to believe | |
| notification to the subscriber whose activities are recorded in the | |
| records described above would impede or destroy this investigation. | |
| Accordingly, the court certifies the request of the San Diego Police | |
| Department that notification to the subscriber be deferred pending | |
| further order of this court. | |
| On April 30, 1992, a search warrant was issued in the municipal court of the | |
| State of California in the county of San Diego which authorized the search of | |
| Kludge's residence and the seizure of: | |
| All computer equipment and paraphernalia use in computer hacking, or apart | |
| of the BBS known as Scantronics which includes, but is not limited to | |
| monitor(s), keyboard(s), CPU(s), which may or may not contain hard disk | |
| drive(s), floppy drive(s), tape drive(s), CD rom drive(s), modem(s), | |
| fax/modem(s), all hard copies (paper copies) of any computer files which | |
| have been stored or currently stored on/in a computer system, all | |
| documents whether in hard or data form which show how to operate any | |
| computer program or computer file, all memory storage devices which may | |
| include hard disk drive(s), 5 1/4" and 3 1/2" computer memory storage | |
| disks, all computer memory storage and computer back up tapes, and all | |
| computer CD rom disks capable of computer data storage; and, documents and | |
| effects which tend to show dominion and control over said premises and | |
| computer system, including fingerprints, records, handwritings, documents | |
| and effects which bear a form of identification such as a person's name, | |
| photograph, social security number, or driver's license number and keys. | |
| The warrant was used immediately and Scantronics BBS and much more was seized. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| The Crypt Keeper Responds | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Date: Wed, 17 Jun 92 09:13:50 PDT | |
| From: tck@bend.UCSD.EDU (Kevin Marcus) | |
| To: knight@eff.org | |
| Subject: Hmm. | |
| I'll start at the beginning... | |
| On April 3rd, I arrived at my workplace (a computer store) around 3 pm. | |
| Multiplexor is sitting in the back with some FBI agent and Detective Dennis | |
| Sadler. The reason they chose my store for technical support is because Dennis | |
| and one of my managers are very good friends. | |
| I saw what was happening, and I saw Multiplexor call up Kludge's board and try | |
| to log on, but alas he was not validated. Nonetheless, that same day I told | |
| Gatsby and Kludge what was up, because they are/were my friends and I didn't | |
| want something bad to happen to them. | |
| A few days later, my boss suggested that I tell Dennis that I was on Kludge's | |
| board awhile ago, but that I was not anymore because they might have found | |
| something on me. So the next time I saw him (he comes in about once a week, | |
| still), I told him that I was on the board awhile ago, but that I wasn't | |
| anymore. He asked a few stupid questions and I didn't really say a whole bunch | |
| about. | |
| He eventually found out that I had warned Kludge about his board. I am not | |
| really sure how, I sure as heck didn't tell him. He then told me that I | |
| nearly blew their investigation and for interfering with an investigation the | |
| maximum penalty was like 5 years or something like that. He was getting ready | |
| to arrest me and take me down to the county courthouse when my boss was able to | |
| convince him that I was a good kid, not looking for trouble, and that I would | |
| get him something to re-strengthen. So, even though Dennis didn't tell me | |
| specifically to get something from Kludge's board, he told me that what he | |
| needed to get his case back up to par was an idea of what was on the board, | |
| like a buffering of his system. | |
| That night I called up Gatsby and got his password from him. I called and | |
| buffered. The next time that I saw him [Sadler], I told him what I had done. | |
| He wanted to know how I got on Kludge's board, and I told him through a | |
| friend's account. He asked me which friend, and I said "The Gatsby." He then | |
| started asking me a bunch of questions about Gatsby such as, "What is his real | |
| name?" And, at first I said that I didn't want to tell him, and then he said | |
| that I was withholding evidence and he could bust me on that alone. So I told | |
| him his name and that he lived in XXXXX (a suburb of San Diego). They already | |
| had him and Kludge in phone conversations over Kludge's line since it was taped | |
| for a while so they knew who he was in the first place. | |
| If Sadler didn't have anything hanging over my head, such as interfering with | |
| an investigation, and/or withholding evidence, then I would not have said jack, | |
| more than likely. My first contact with him was on suggestion of my boss, who | |
| is a good friend of his, and he might have told my boss something which made | |
| him worry and think that I would be arrested for something, I do not know. | |
| Now, if I was a nark, then I can assure you that a LOT more people would have | |
| gone down. I have a plethora of information on who is who, who is where, who | |
| does what, etc. and, even though it's old, I bet a lot of it is true. If I | |
| wanted there to be another Operation Sun-Devil, then I would have given all of | |
| that information to him. But I didn't, because that is not at all what I had | |
| wanted. I didn't want anyone to get busted (including myself) for anything. | |
| If I were a nark, then I would probably have given him a lot more information, | |
| wouldn't you think? | |
| I sure do. | |
| I am not asking anyone to forget about it. I know that I screwed up, but there | |
| is not a whole bunch about it that I can do right now. | |
| When Sadler was here asking me questions, it didn't pop into my mind that I | |
| should tell him to wait and then go and call my attorney, and then a few | |
| minutes later come back and tell him whatever my lawyer said. I was scared. | |
| _______________________________________________________________________________ | |
| Hackers Aren't The Real Enemy June 8, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Chris Goggans (ComputerWorld)(Page 37) | |
| (Goggans is a 23-year old hacker who is currently seeking employment with | |
| anyone who won't make him cut his hair.) | |
| For years articles have been published about people who call themselves | |
| "hackers." These have been written by people who have investigated hackers, | |
| who have been the targets of hackers, who secure systems against hackers and | |
| who claim to know hackers. As a member of the so-called "computer | |
| underground," I would like to present the hacker's point of view. | |
| I hope you will put aside any personal bias you may have toward people who call | |
| themselves hackers because it is probably based on media reports rather than | |
| real contact. | |
| I also hope you won't refuse to read this because you have a problem with my | |
| ethics. Over the past 11 years, operating under the pseudonym Erik Bloodaxe, I | |
| had opportunities to become rich beyond the dreams of avarice and wreak great | |
| havoc on the world's computer networks. Yet I have done neither. I have | |
| looked behind doors that were marked "employees only" but have never disrupted | |
| the operation of business. Voyeurism is a far cry from rape. | |
| Illegal, but not criminal | |
| Undeniably, the actions of some hackers are illegal, but they are still hardly | |
| criminal in nature. The intention of most of these individuals is not to | |
| destroy or exploit systems but merely to learn in minute detail how they are | |
| used and what they are used for. The quest is purely intellectual, but the | |
| drive to learn is so overwhelming that any obstacle blocking its course will be | |
| circumvented. Unfortunately, the obstacles are usually state and federal laws | |
| on unauthorized computer access. | |
| The overwhelming difference between today's hackers and their 1960s MIT | |
| namesakes is that many of my contemporaries began their endeavors too young to | |
| have ready access to computer systems. Few 13-year-olds find themselves with | |
| system privileges on a VAX through normal channels. | |
| My own first system was an Atari 8-bit computer with 16K of memory. I soon | |
| realized that the potential of such a machine was extremely limited. With the | |
| purchase of a modem, however, I was able to branch out and suddenly found | |
| myself backed by state-of-the-art computing power at remote sites across the | |
| globe. Often, I was given access by merely talking to administrators about the | |
| weak points in their systems, but most often my only access was whatever | |
| account I may have stumbled across. | |
| Many people find it hard to understand why anyone would risk prosecution just | |
| to explore a computer system. I have asked myself that same question many | |
| times and cannot come up with a definitive answer. I do know that it is an | |
| addiction so strong that it can, if not balanced with other activities, lead to | |
| total obsession. Every hacker I know has spent days without sleep combing the | |
| recesses of a computer network, testing utilities and reading files. Many | |
| times I have become so involved in a project that I have forgotten to eat. | |
| Hackers share almost no demographic similarities: They are of all income | |
| levels, races, colors and religions and come from almost every country. There | |
| are some shared characteristics, however. Obsessive-compulsive behavior (drug | |
| or alcohol abuse, gambling, shoplifting) is one. Others have a history of | |
| divorce in their families, intelligence scores in the gifted to genius level, | |
| poor study habits and a distrust of any authority figure. Most hackers also | |
| combine inherent paranoia and a flair for the romantic -- which is apparent in | |
| the colorful pseudonyms in use throughout the hacker community. | |
| In most cases, however, once hackers reach college age -- or, at minimum, the | |
| age of legal employment -- access to the systems they desire is more readily | |
| available through traditional means, and the need to break a law to learn is | |
| curtailed. | |
| Popular media has contributed greatly to the negative use of the word "hacker." | |
| Any person found abusing a long-distance calling card or other credit card is | |
| referred to as a hacker. Anyone found to have breached computer security on a | |
| system is likewise referred to as a hacker and heralded as a computer whiz, | |
| despite the fact that even those with the most basic computer literacy can | |
| breach computer security if they put their minds to it. | |
| Although the media would have you believe otherwise, all statistics show that | |
| hackers have never been more than a drop in the bucket when it comes to serious | |
| computer crime. In fact, hackers are rarely more than a temporary nuisance, if | |
| they are discovered at all. The real danger lies in the fact that their | |
| methods are easily duplicated by people whose motives are far more sinister. | |
| Text files and other information that hackers write on computer systems can be | |
| used by any would-be corporate spy to help form his plan of attack on a | |
| company. | |
| Given that almost everyone is aware of the existence and capabilities of | |
| hackers -- and aware of how others can go through the doors hackers open -- the | |
| total lack of security in the world's computers is shocking. | |
| Points of entry | |
| The primary problem is poor systems administration. Users are allowed to | |
| select easily guessed passwords. Directory permissions are poorly set. Proper | |
| process accounting is neglected. Utilities to counter these problems exist for | |
| every operating system, yet they are not widely used. | |
| Many systems administrators are not provided with current information to help | |
| them secure their systems. There is a terrible lack of communication between | |
| vendors and customers and inside the corporate community as a whole. | |
| Rather than inform everyone of problems when they are discovered, vendors keep | |
| information in secret security databases or channel it to a select few through | |
| electronic-mail lists. This does little to help the situation, and, in fact, | |
| it only makes matters worse because many hackers have access to these databases | |
| and to archives of the information sent in these mailing lists. | |
| Another major problem in system security comes from telecommunications | |
| equipment. The various Bell operating companies have long been the targets of | |
| hackers, and many hackers know how to operate both corporate and central office | |
| systems better than the technicians who do so for a living. | |
| Increased use of computer networks has added a whole new dimension of | |
| insecurity. If a computer is allowed to communicate with another on the same | |
| network, every computer in the link must be impenetrable or the security of all | |
| sites is in jeopardy. The most stunning examples of this occur on the | |
| Internet. With such a wide variety of problems and so little information | |
| available to remedy them, the field of computer security consulting is growing | |
| rapidly. Unfortunately, what companies are buying is a false sense of | |
| security. The main players seem to be the national accounting firms. Their | |
| high-cost audits are most often procedural in nature, however, and are rarely | |
| conducted by individuals with enough technical expertise to make | |
| recommendations that will have a real and lasting effect. | |
| Ultimately, it is the responsibility of the systems administrators to ensure | |
| that they have the proper tools to secure their sites against intrusion. | |
| Acquiring the necessary information can be difficult, but if outsiders can get | |
| their hands on this information, so can the people who are paid to do the job. | |
| _______________________________________________________________________________ | |
| THE GREAT DEBATE | |
| Phiber Optik v. Donn Parker | |
| Cyberpunk Meets Mr. Security June 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Jonathan Littman (PC Computing Magazine)(Page 288) | |
| The boy cautiously approached the table and asked the tall, distinguished bald | |
| gentleman in the gray suit if he could join him. The boy's conference name tag | |
| read Phiber Optik; the gentleman's read Donn Parker. One was a member of the | |
| Legion of Doom, the infamous sect of teenage hackers charged with fraud, | |
| conspiracy, and illegal computer access in 1990; the other was a legendary | |
| security expert. | |
| The unlikely pair had been brought together by an unusual gathering, the | |
| nation's first Computers, Freedom, and Privacy conference, held in the San | |
| Francisco Bay Area on the last weekend of March 1991. They were part of an | |
| eclectic mix of G-men, Secret Service agents, prosecutors, privacy advocates, | |
| and hackers who had come to see the other side up close. | |
| Only weeks before, Optik's laptop computer had been seized by state police in | |
| an investigation begun by the Secret Service. Optik and fellow hackers Acid | |
| Phreak and Scorpion were among the first to come under the scrutiny of the | |
| Secret Service in the days of Operation Sun Devil, a 14-city sweep in the | |
| spring of 1990 that resulted in 42 seized computers, 23,000 confiscated disks, | |
| and four arrests. | |
| The criminal charges brought against Optik and his cohort included illegal | |
| computer access and trading in stolen access codes. Optik, a juvenile at the | |
| time of his initial questioning, spent a day in jail and was later convicted of | |
| a misdemeanor for theft of services. | |
| Parker knew the story well. Over the last two decades, the former Lutheran | |
| Sunday school teacher has interviewed dozens of criminals to whom computers | |
| were simply the tools of the trade. Along the way, he earned a worldwide | |
| reputation as the bald eagle of computer crime. Parker speaks frequently to | |
| law-enforcement agencies and corporations as a consultant to SRI International, | |
| a leading research and management firm based in Menlo Park, California. His | |
| books Fighting Computer Crime and Crime by Computer, countless articles, and a | |
| large Justice Department study on computer ethics have established him as the | |
| foremost authority on the hacker psyche. | |
| PARKER: How do you view the ethics of getting into someone's computer system? | |
| OPTIK: I know what your point of view is because I've read your papers and | |
| I've listened to you talk. I know that you think any entry, you know, | |
| any unauthorized entry, is criminal. | |
| I can't say I agree with that. I do agree that anyone who's an | |
| impressionable teenager, who's on the scene and wants to break into as | |
| many computers as is humanly possible to prove a point, has the | |
| potential to do damage, because they're juveniles and have no idea what | |
| they're doing, and they're messing around in places that they have no | |
| business being. | |
| At the time, I was 17 years old and still a minor. There was no way I | |
| was going to be able to buy a Unix, a VAX, my own switching system. | |
| These are the things I'm interested in learning how to program. It | |
| would not have been possible to access this type of computer | |
| development environment had I not learned how to break into systems. | |
| That's the way I see it. | |
| PARKER: What are you doing at this conference? What's your purpose? | |
| OPTIK: Basically I want to be exposed to as many people as possible and hear | |
| as many people's views as I can. | |
| PARKER: What's your ultimate purpose then-what would you like to do as far as | |
| a career? Do you think this is a way for you to get into a career? | |
| OPTIK: Well, of course, I hope to enter the computer industry. Just by being | |
| here, I hope to talk to people like you, the many people who are | |
| professionals in the field, hear their views, have them hear my views. | |
| See, the thing I regret the most is that there is this communication | |
| gap, a lack of dialogue between people who proclaim themselves to be | |
| hackers and people who are computer professionals. I think if there | |
| were a better dialogue among the more respectable type of hackers and | |
| the computer professionals, then it would be a lot more productive. | |
| PARKER: How do you tell the difference between a more responsible type of | |
| hacker? | |
| OPTIK: I realize that its a very big problem. I can see that it's pretty | |
| impossible to tell, and I can clearly understand how you come to the | |
| conclusions that you initially state in your paper about how hackers | |
| have been known to cheat, lie, and exaggerate. I experienced that | |
| firsthand all the time. I mean, these people are generally like that. | |
| Just keep in mind that a large number of them aren't really hardcore | |
| hackers -- they're impressionable teenagers hanging out. Its just that | |
| the medium they're using to hang out is computers. | |
| I don't consider myself part of that crowd at all. I got into | |
| computers early on. Like when I was entering junior high school. I was | |
| really young, it must have been preteen years. I'm talking about 12 or | |
| 13 years old when I got a computer for Christmas. | |
| I didn't immediately go online. I'm not one of these kids today that | |
| get a Commodore 64 with a modem for Christmas because they got good | |
| grades on their report card. The reason I would have called myself a | |
| hacker is, I was hacking in the sense of exploring the world inside my | |
| computer, as far as assembly language, machine language, electronics | |
| tinkering, and things of that nature. That truly interested me. | |
| The whole social online thing I could really do without because that's | |
| where these ideas come from. You know, this whole negative, this bad | |
| aftertaste I get in my mouth when I hear people put down the whole | |
| hacking scene. Its because of what they're hearing, and the reason | |
| they're hearing this is because of the more outspoken people in this | |
| "computer underground" and the twisted coverage in the media, which is | |
| using this whole big hype to sell papers. | |
| And the people who are paying the price for it are people like me; and | |
| the people who are getting a twisted view of things are the | |
| professionals, because they're only hearing the most vocal people. | |
| It's another reason why I'm here, to represent people like myself, who | |
| want other people to know there are such things as respectable hackers. | |
| You know hacking goes beyond impressionable young teenage delinquents. | |
| PARKER: How would you define hacking? | |
| OPTIK: It's this overall wanting to understand technology, to be able to | |
| communicate with a machine on a very low level, to be able to program | |
| it. Like when I come upon a computer, it's like my brain wants to talk | |
| to its microprocessor. That's basically my philosophy. | |
| PARKER. And does it matter to you who actually owns the computer? | |
| OPTIK: Usually it does. Oh, at first it didn't matter. The mere fact of | |
| getting into Unix, and learning Unix, was important enough to warrant | |
| me wanting to be on the system. Not because of information that was in | |
| there. I really don't care what the information is. | |
| You know there's that whole Cyberpunk genre that believes information | |
| should be free. I believe in computer privacy wholly. I mean if | |
| someone wants something to be private, by all means let it be private. | |
| I mean, information is not meant for everyone to see if you design it | |
| as being private. That's why there is such a thing as security. | |
| If someone wants to keep something private, I'm not going to try to | |
| read it. It doesn't interest me. I couldn't care less what people are | |
| saying to each other on electronic mail. I'm there because I'm | |
| interested in the hardware. | |
| PARKER: How is anyone else going to know that you're not interested in reading | |
| their private mail? | |
| OPTIK: That's a problem I have to deal with. There's not a real solution in | |
| the same way that there's no way that you're really going to be able | |
| to tell whether someone's malicious or not. Hackers do brag, cheat, | |
| and exaggerate. They might tell you one thing and then stab you in the | |
| back and say something else. | |
| PARKER: I've interviewed over 120 so-called computer criminals. | |
| OPTIK: Right. | |
| PARKER: I've interviewed a lot of hackers, and I've also interviewed a lot of | |
| people engaged in all kinds of white-collar crime. | |
| OPTIK: Yeah. | |
| PARKER: And it seems to me that the people I have talked with that have been | |
| convicted of malicious hacking and have overcome and outgrown that | |
| whole thing have gone into legitimate systems programming jobs where | |
| there is great challenge, and they're very successful. They are not | |
| engaged in malicious hacking or criminal activity, and they're making a | |
| career for themselves in technology that they love. | |
| OPTIK: Right. | |
| PARKER: Why couldn't you go that route? Why couldn't you get your credentials | |
| by going to school like I did and like everybody else did who functions | |
| as a professional in the computer field, and get a challenging job in | |
| computer technology? | |
| OPTIK: I certainly hope to get a challenging job in computer technology. But | |
| I just feel that where I live, and the way the school system is where I | |
| am, it doesn't cater to my needs of wanting to learn as much about | |
| technology as fast as I want to learn. | |
| PARKER: Yeah, but one of the things you have to learn, I guess, is patience, | |
| and you have to be willing to work hard and learn the technology as | |
| it's presented. | |
| OPTIK: You know, you just have to remember that by being able to go places | |
| that people shouldn't, I'm able to learn things about technology that | |
| schools don't teach. It's just that programs in local colleges where I | |
| am, they couldn't even begin to grasp things that I've experienced. | |
| PARKER: OK, so you want instant gratification then. | |
| OPTIK: It's not so much gratification . . . | |
| PARKER: You're not willing to spend four years in a-- | |
| OPTIK: I certainly am willing to go to college. | |
| PARKER: Uh huh. | |
| OPTIK: I definitely intend to go to college; I just don't expect to learn very | |
| much concerning technology. I do expect to learn some things about | |
| technology I probably didn't know, but I don't expect to be exposed to | |
| such a diverse amount of technology as in my teenage years. | |
| PARKER: OK, well, I can see impatience and a lack of opportunity to do all | |
| that stuff very quickly, but-- | |
| OPTIK: I wouldn't go so far as to call it impatience. I'd call it an | |
| eagerness to learn. | |
| PARKER: Eagerness to learn can be applied in the establishment process of | |
| education in all kinds of ways. You can excel in school. | |
| OPTIK: I was never Mr. Academia, I can tell you that right off the bat. I | |
| don't find much of interest in school. Usually I make up for it by | |
| reading technology manuals instead. | |
| PARKER: How are you going to spend four years in school if you've already | |
| decided you're really not suited to be in school? | |
| OPTIK: Well, it's not so much school as it is that I feel constrained being in | |
| high school and having to go through junior high school and high school | |
| because of the way the educational program are tailored to like, you | |
| know -- | |
| PARKER: Well, if you hold this direction that you're going right now, you could | |
| very well end up as a technician repairing equipment, maintaining | |
| computers, and you could very well end up in a dead-end job. | |
| In order to break into a higher level of work, you need a ticket, you | |
| need a degree, you have to prove that you have been able to go to | |
| school and get acceptable grades. The route that you're going doesn't | |
| seem to me to lead to that. | |
| Now there are some people who have managed to overcome that, OK -- | |
| Geoff Goodfellow. Steve Wozniak. But those people are 1 out of | |
| 100,000. All the other 99,000-odd people are technicians. They're | |
| leading reasonable lives, making a reasonable income, but they're not | |
| doing very big things. They're keeping equipment running. | |
| OPTIK: Yeah. | |
| PARKER: And if you have all this curiosity and all this drive and this energy | |
| (which is what it takes), and you go a route that gets you to a | |
| position where you can do real, exciting, advanced research . . . I | |
| mean, I've talked to a lot of hackers. I'm thinking of one in | |
| Washington, D.C., who was convicted of a computer crime. He went back | |
| to school, he's got his degree, and he has a very top systems | |
| programming job. He said he finally reached a point where he decided | |
| he had to change the way he was going about this, because the way | |
| things were going, the future for him was pretty bleak. | |
| And it seems to me, hopefully, you may come to a realization that to | |
| do important things, exciting things, ultimately you've got to learn | |
| the computer-science way of presenting operating systems, and how to | |
| write programs of a very large, complex nature. | |
| Have you ever done that, have you ever written a really big computer | |
| program? | |
| OPTIK: I've written this . . . | |
| PARKER: There's a discipline involved that has to do with learning how to be an | |
| engineer. It takes a tremendous amount of education and discipline. | |
| And it sounds to me like you lack the discipline. You want instant | |
| gratification, you want to be an expert now. And you end up being an | |
| expert all right, but in a very narrow range of technology. | |
| You learn the Novell LAN, you learn some other aspect, you learn about | |
| a telephone company's switching system. That doesn't lead to a career | |
| in designing and developing systems. That leads to a career in | |
| maintaining the kind of hardware that you've been hacking. | |
| And it seems to me you've got to go back and learn the principles. | |
| What are the basic principles of an operating system? What are the | |
| basic principles of access control? Until you've gone back and learned | |
| those basics, you're flying by the seat of your pants, and just picking | |
| up odds and ends of stuff that you can grab quickly. | |
| OPTIK: I don't see it so much as grabbing things quickly. I've put a lot of | |
| time into studying very detailed things. It's not so much popping in | |
| and popping out and whatever I find I'm glad I found it. I do spend a | |
| lot of time studying manuals and things. | |
| PARKER: Manuals are not going to do it. All you do in learning a manual is | |
| learn the current equipment and how it works. If you studied Donald | |
| Kanuth's volumes on computer science programming and computer sciences, | |
| you would learn the theory of computer programming, you would learn | |
| the operating system theory, you would learn the theory that is the | |
| foundation on which all of these systems are built. | |
| OPTIK: But that's the thing I guess I don't do. I was never much concerned | |
| with theory of operation. I was always concerned with how things work, | |
| and how I can use them. Like how to program. I'll admit I was never | |
| much into theory. It never interested me. Like with what I do-theory | |
| really doesn't play any role at the present time. Of course, that's | |
| subject to change at any time. I'm rather young . . . | |
| A FRIEND WHISPERED in Optik's ear that it was time to go. Still locked in | |
| debate, the hacker and the security man left the table and walked together | |
| toward the escalator. In profile, at the bottom of the moving stairs, they | |
| were an odd couple: Optik with his shiny, jet black hair, Parker with his | |
| shiny dome. | |
| Parker was speaking calmly, warning Optik that one day hacking wouldn't seem | |
| so boundless, that one day his opportunities wouldn't seem quite so vast. | |
| Optik fidgeted, glancing away. Conference attendees filed up the escalator. | |
| "I don't want to be a hacker forever," blurted Optik. | |
| The next afternoon the bank of hotel phones was crowded with business people | |
| and conference attendees punching in to get their messages and make their | |
| calls. There was Optik, wedged between the suits, acoustic coupler slipped | |
| over the phone receiver, a laptop screen flickering before his eyes, his hands | |
| flitting over the keys. | |
| He was still young. | |