| ==Phrack Magazine== | |
| Volume Five, Issue Forty-Six, File 28 of 28 | |
| PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Compiled by Datastream Cowboy PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Damn The Torpedoes June 6, 1994 | |
| ~~~~~~~~~~~~~~~~~~ | |
| by Loring Wirbel (Electronic Engineering Times) (Page 134) | |
| On May 3, a gargantuan satellite was launched with little press coverage | |
| from Cape Canaveral. | |
| The $1.5 billion satellite is a joint project of the NSA and the | |
| National Reconnaissance Office. At five tons, it is heavy enough to | |
| have required every bit of thrust its Titan IV launcher could | |
| provide--and despite the boost, it still did enough damage to the | |
| launch-pad water main to render the facility unusable for two months. | |
| The satellite is known as Mentor, Jeroboam and Big Bertha, and it has an | |
| antenna larger than a football field to carry out "hyper-spectral | |
| analysis" -- Reconnaissance Office buzzwords for real-time analysis of | |
| communications in a very wide swath of the electromagnetic spectrum. | |
| Clipper and Digital Signature Standard opponents should be paying | |
| attention to this one. Mentor surprised space analysts by moving into a | |
| geostationary rather than geosynchronous orbit. Geostationary orbit | |
| allows the satellite to "park" over a certain sector of the earth. | |
| This first satellite in a planned series was heading for the Ural | |
| Mountains in Russia at last notice. Additional launches planned for | |
| late 1994 will park future Mentors over the western hemisphere. | |
| According to John Pike of the Federation of American Scientists, those | |
| satellites will likely be controlled from Buckley Field (Aurora, | |
| Colorado), an NSA/Reconnaissance downlink base slated to become this | |
| hemisphere's largest intelligence base in the 1990s. | |
| [Able to hear a bug fart from space. DC to Daylight realtime analysis. | |
| And you Clipper whiners cry about someone listening to your phone calls. | |
| Puh-lease.] | |
| ----------------------------------------------------------------------------- | |
| Discovery of 'Data Processing Virus Factory' In Italy February 17, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| AFP Sciences | |
| It was learned in Rome on 10 February that a data processing virus | |
| "factory" -- in fact, a program called VCL (Viruses Creation Laboratory), | |
| capable of triggering a virus epidemic--was discovered in Italy | |
| Mr. Fulvio Berghella, deputy directory-general of the Italian Institute | |
| for Bank Data Processing Security (ISTINFORM), discovered what it takes | |
| to enable just about anybody to fabricate data processing viruses; he told | |
| the press that its existence had been suspected for a year and a half and | |
| that about a hundred Italian enterprises had been "contaminated." | |
| An investigation was launched to try to determine the origin of the program, | |
| said Mr. Alessandro Pansa, chief of the "data processing crime" section | |
| of the Italian police. Several copies of VCL were found in various places, | |
| particularly in Rome and Milan. | |
| Producing viruses is very simple with the help of this program, but it is | |
| not easy to find. A clandestine Bulgarian data bank, as yet not identified, | |
| reportedly was behind all this. An international meeting of data processing | |
| virus "hunters" was organized in Amsterdam on 12 February to draft | |
| a strategy; an international police meeting on this subject will be held | |
| next week in Sweden. | |
| Since 1991, the number of viruses in circulation throughout the world | |
| increased 500% to a total of about 10,000 viruses. In Italy, it is not | |
| forbidden to own a program of this type, but dissemination of viruses | |
| is prosecuted. | |
| [So, I take it Nowhere Man cannot ever travel to Italy?] | |
| -------------------------------------------------------------------------- | |
| DEFCON TV-News Coverage July 26, 1994 | |
| by Hal Eisner (Real News at 10) (KCOP Channel 13 Los Angeles) | |
| [Shot of audience] | |
| Female Newscaster: "Hackers are like frontier outlaws. Look at what Hal | |
| Eisner found at a gathering of hackers on the Las | |
| Vegas strip." | |
| [Shot of "Welcome to Vegas" sign] | |
| [Shot of Code Thief Deluxe v3.5] | |
| [Shot of Dark Tangent talking] | |
| Dark Tangent: "Welcome to the convention!" | |
| [Shot of Voyager hanging with some people] | |
| Hal Eisner: "Well not everyone was welcome to this year's | |
| Def Con II, a national convention for hackers. | |
| Certainly federal agents weren't." | |
| [Shot DTangent searching for a fed] | |
| Dark Tangent: "On the right. Getting closer." | |
| Fed: "Must be me! Thank you." | |
| [Dark Tangent gives the Fed "I'm a Fed" t-shirt] | |
| Hail Eisner: "Suspected agents were ridiculed and given | |
| identifying t-shirts. While conventioneers, some of | |
| [Shot of someone using a laptop] | |
| which have violated the law, and many of which are | |
| [Shot of some guy reading the DefCon pamphlet] | |
| simply tech-heads hungry for the latest theory, got | |
| [Shot of a frequency counter, and a scanner] | |
| to see a lot of the newest gadgetry, and hear some | |
| tough talk from an Arizona Deputy DA that | |
| [Shot of Gail giving her speech] | |
| specializes on computer crime and actually | |
| recognized some of her audience." | |
| Gail: "Some people are outlaws, crooks, felons maybe." | |
| [Shot back of conference room. People hanging] | |
| Hal Eisner: "There was an Alice in Wonderland quality about all | |
| of this. Hackers by definition go where they are not | |
| invited, but so is the government that is trying to | |
| intrude on their privacy." | |
| Devlin: "If I want to conceal something for whatever reason. | |
| I'd like to have the ability to." | |
| Hal Eisner: "The bottom line is that many of the people here | |
| want to do what they want, when they want, and how | |
| they want, without restrictions." | |
| Deadkat: "What we are doing is changing the system, and if you | |
| have to break the law to change the system, so be it!" | |
| Hal Eisner: "That's from residents of that cyberspacious world | |
| [Shot of someone holding a diskette with what is supposed to be codez on the | |
| label] | |
| of behind the computer screen where the shy can be | |
| [Code Thief on the background] | |
| dangerous. Reporting from Las Vegas, Hal Eisner, | |
| Real News. | |
| ------------------------------------------------------------------------------ | |
| Cyber Cops May 23, 1994 | |
| ~~~~~~~~~~ | |
| by Joseph Panettieri (Information Week) (Page 30) | |
| When Chris Myers, a software engineer at Washington University in | |
| St. Louis, arrived to work one Monday morning last month, he realized | |
| something wasn't quite right. Files had been damaged and a back door | |
| was left ajar. Not in his office, but on the university's computer network. | |
| Like Commissioner Gordon racing to the Batphone, Myers swiftly called the | |
| Internet's guardian, the Computer Emergency Response Team (CERT). | |
| The CERT team boasts impressive credentials. Its 14 team members are | |
| managed by Dain Gary, former director of corporate data security at | |
| Mellon Bank Corp. in Pittsburgh. While Gary is the coach of the CERT | |
| squad, Moira West is the scrambling on-field quarterback. As manager | |
| of CERT's incident-response team and coordination center, she oversees | |
| the team's responses to attacks by Internet hackers and its search for | |
| ways to reduce the Internet's vulnerabilities. West was formerly a | |
| software engineer at the University of York in England. | |
| The rest of the CERT team remains in the shadows. West says | |
| the CERT crew hails from various information-systems backgrounds, | |
| but declines to get more specific, possibly to hide any Achilles' | |
| heels from hackers. | |
| One thing West stresses is that CERT isn't a collection of reformed | |
| hackers combing the Internet for suspicious data. "People have to | |
| trust us, so hiring hackers definitely isn't an option," she says. | |
| "And we don't probe or log-on to other people's systems." | |
| As a rule, CERT won't post an alert until after it finds a | |
| remedy to the problem. But that can take months, giving hackers | |
| time to attempt similar breakins on thousands of Internet hosts | |
| without fear of detection. Yet CERT's West defends this policy: | |
| "We don't want to cause mass hysteria if there's no way to | |
| address a new, isolated problem. We also don't want to alert the | |
| entire intruder community about it." | |
| ------------------------------------ | |
| Who You Gonna Call? | |
| How to reach CERT | |
| Phone: 412-268-7090 | |
| Internet: cert@cert.org | |
| Fax: 412-268-6989 | |
| Mail: CERT Coordination Center | |
| Software Engineering Institute | |
| Carnegie Mellon University | |
| Pittsburgh, PA 15213-3890 | |
| ------------------------------------ | |
| [Ask for that saucy British chippie. Her voice will melt you like | |
| butter. | |
| CERT -- Continually re-emphasizing the adage: "You get what you pay for!"] | |
| And remember, CERT doesn't hire hackers, they just suck the juicy bits | |
| out of their brains for free. | |
| ------------------------------------------------------------------------------ | |
| Defining the Ethics of Hacking August 12, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Amy Harmon (Los Angeles Times) (page A1) | |
| Eric Corley, a.k.a Emmanuel Goldstein -- patron saint of computer | |
| hackers and phone phreaks -- is having a party. | |
| And perhaps it is just in time. 2600, the hacker magazine Corley | |
| started when he was 23, is a decade old. It has spawned monthly | |
| hacker meetings in dozens of cities. It has been the target of a | |
| Secret Service investigation. It has even gone aboveground, with | |
| newsstand sales of 20,000 last year. | |
| As hundreds of hackers converge in New York City this weekend to celebrate | |
| 2600's anniversary, Corley hopes to grapple with how to uphold the | |
| "hacker ethic," an oxymoron to some, in an era when many of 2600's devotees | |
| just want to know how to make free phone calls. (Less high-minded | |
| activities -- like cracking the New York City subway's new electronic | |
| fare card system -- are also on the agenda). | |
| Hackers counter that in a society increasingly dependent on | |
| technology, the very basis for democracy could be threatened by limiting | |
| technological exploration. "Hacking teaches people to think critically about | |
| technology," says Rop Gonggrijp, a Dutch hacker who will attend the Hackers | |
| on Planet Earth conference this weekend. "The corporations that are building | |
| the technology are certainly not going to tell us, because they're trying to | |
| sell it to us. Whole societies are trusting technology blindly -- they just | |
| believe what the technocrats say." | |
| Gonggrijp, 26, publishes a magazine much like 2600 called Hack-Tic, | |
| which made waves this year with an article showing that while tapping mobile | |
| phones of criminal suspects with radio scanners, Dutch police tapped into | |
| thousand of other mobile phones. | |
| "What society needs is people who are independent yet knowledgeable," | |
| Gonggrijp said. 'That's mostly going to be young people, which society is | |
| uncomfortable with. But there's only two groups who know how the phone and | |
| computer systems work, and that's engineers and hackers. And I think that's | |
| a very healthy situation." | |
| [By the way Amy: Phrack always grants interviews to cute, female | |
| LA Times reporters.] | |
| ------------------------------------------------------------------------------ | |
| Fighting Telephone Fraud August 1, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Barbara DePompa (Information Week) (Page 74) | |
| Local phone companies are taking an active role in warning customers of | |
| scams and cracking down on hackers. | |
| Early last month, a 17-year old hacker in Baltimore was caught | |
| red-handed with a list of more than 100 corporate authorization codes that | |
| would have enabled fraud artists to access private branch exchanges and | |
| make outgoing calls at corporate expanse. | |
| After the teenager's arrest, local police shared the list with Bell | |
| Atlantic's fraud prevention group. Within hours, the phone numbers were | |
| communicated to the appropriate regional phone companies and corporate | |
| customers on the list were advised to either change their authorization | |
| codes or shut down outside dialing privileges. | |
| "We can't curb fraud without full disclosure and sharing this type | |
| of vital information" points out Mary Chacanias, manager of | |
| telecommunications fraud prevention for Bell Atlantic in Arlington, VA. | |
| ----------------------------------------------------------------------------- | |
| AT&T Forms Team to Track Hackers August 30, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| (Reuters News Wire) | |
| AT&T Corp.'s Global Business Communications Systems subsidiary said | |
| Wednesday it has formed an investigative unit to monitor, track and | |
| catch phone-system hackers in the act of committing toll fraud. | |
| The unit will profile hacker activity and initiate "electronic | |
| stakeouts" with its business communications equipment in cooperation | |
| with law enforcement agencies, and work with them to prosecute the | |
| thieves. | |
| "We're in a shoot-out between 'high-tech cops' -- like AT&T -- and | |
| 'high-tech robbers' who brazenly steal long distance service from our | |
| business customers," said Kevin Hanley, marketing director for business | |
| security systems for AT&T Global Business. | |
| "Our goal is not only to defend against hackers but to get them off the | |
| street." | |
| [Oh my God. Are you scared? Have you wet yourself? YOU WILL!] | |
| ----------------------------------------------------------------------------- | |
| Former FBI Informant a Fugitive July 31, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Keith Stone (Daily News) | |
| Computer outlaw Justin Tanner Petersen and prosecutors | |
| cut a deal: The Los Angeles nightclub promoter known in | |
| the computer world as "Agent Steal" would work for the | |
| government in exchange for freedom. | |
| With his help, the government built its case against | |
| Kevin Lee Poulsen, a Pasadena native who pleaded guilty | |
| in June to charges he electronically rigged telephones at | |
| Los Angeles radio stations so he could win two Porsches, | |
| $22,000 and two trips to Hawaii. | |
| Petersen also provided information on Kevin Mitnick, a | |
| Calabasas man wanted by the FBI for cracking computer and | |
| telephone networks at Pacific Bell and the state Department | |
| of Motor Vehicles, according to court records. | |
| Petersen's deal lasted for nearly two years - until | |
| authorities found that while he was helping them undercover, | |
| he also was helping himself to other people's credit cards. | |
| Caught but not cornered, the 34-year-old "Agent Steal" had | |
| one more trick: He admitted his wrongdoing to a prosecutor | |
| at the Los Angeles U.S. Attorney's Office, asked to meet | |
| with his attorney and then said he needed to take a walk. | |
| And he never came back. | |
| A month after Petersen fled, he spoke with a magazine for | |
| computer users about his role as an FBI informant, who he | |
| had worked against and his plans for the future. | |
| "I have learned a lot about how the bureau works. Probably | |
| too much," he said in an interview that Phrack Magazine published | |
| Nov. 17, 1993. Phrack is available on the Internet, a worldwide | |
| network for computer users. | |
| Petersen told the magazine that working with the FBI was fun | |
| most of the time. "There was a lot of money and resources used. | |
| In addition, they paid me well," he said. | |
| "If I didn't cooperate with the bureau," he told Phrack, "I | |
| could have been charged with possession of government material." | |
| "Most hackers would have sold out their mother," he added. | |
| Petersen is described as 5 foot, 11 inches, 175 pounds, with | |
| brown hair - "sometimes platinum blond." But his most telling | |
| characteristic is that he walks with the aid of a prosthesis | |
| because he lost his left leg below the knee in a car accident. | |
| Heavily involved in the Hollywood music scene, Petersen's | |
| last known employer was Club "Velvet Jam," one of a string of | |
| clubs he promoted in Los Angeles. | |
| ----------------------------------------------------------------------------- | |
| Hacker in Hiding July 31, 1994 | |
| ~~~~~~~~~~~~~~~~ | |
| by John Johnson (LA Times) | |
| First there was the Condor, then Dark Dante. The latest computer hacker to | |
| hit the cyberspace most wanted list is Agent Steal, a slender, good-looking | |
| rogue partial to Porsches and BMWs who bragged that he worked undercover | |
| for the FBI catching other hackers. | |
| Now Agent Steal, whose real name is Justin Tanner Petersen, is on the run | |
| from the very agency he told friends was paying his rent and flying him to | |
| computer conferences to spy on other hackers. | |
| Petersen, 34, disappeared Oct. 18 after admitting to federal prosecutors | |
| that he had been committing further crimes during the time when he was | |
| apparently working with the government "in the investigation of other | |
| persons," according to federal court records. | |
| Ironically, by running he has consigned himself to the same secretive life | |
| as Kevin Mitnick, the former North Hills man who is one of the nation's most | |
| infamous hackers, and whom Petersen allegedly bragged of helping to set up | |
| for an FBI bust. Mitnick, who once took the name Condor in homage to a | |
| favorite movie character, has been hiding for almost two years to avoid | |
| prosecution for allegedly hacking into computers illegally and posing as a | |
| law enforcement officer. | |
| Authorities say Petersen's list of hacks includes breaking into computers | |
| used by federal investigative agencies and tapping into a credit card | |
| information bureau. Petersen, who once promoted after-hours rock shows in | |
| the San Fernando Valley, also was involved in the hacker underground's most | |
| sensational scam - hijacking radio station phone lines to win contests with | |
| prizes ranging from new cars to trips to Hawaii. | |
| Petersen gave an interview last year to an on-line publication called Phrack | |
| in which he claimed to have tapped the phone of a prostitute working for | |
| Heidi Fleiss. He also boasted openly of working with the FBI to bust | |
| Mitnick. | |
| "When I went to work for the bureau I contacted him," Petersen said in the | |
| interview conducted by Mike Bowen. "He was still up to his old tricks, so | |
| we opened a case on him. . . . What a loser. Everyone thinks he is some | |
| great hacker. I outsmarted him and busted him." | |
| In the Phrack interview, published on the Internet, an international network | |
| of computer networks with millions of users, Agent Steal bragged about | |
| breaking into Pacific Bell headquarters with Poulsen to obtain information | |
| about the phone company's investigation of his hacking. | |
| Petersen was arrested in Texas in 1991, where he lived briefly. Court | |
| records show that authorities searching his apartment found computer | |
| equipment, Pacific Bell manuals and five modems. | |
| A grand jury in Texas returned an eight-count indictment against Petersen, | |
| accusing him of assuming false names, accessing a computer without | |
| authorization, possessing stolen mail and fraudulently obtaining and using | |
| credit cards. | |
| The case was later transferred to California and sealed, out of concern for | |
| Petersen's safety, authorities said. The motion to seal, obtained by | |
| Sherman, states that Petersen, "acting in an undercover capacity, currently | |
| is cooperating with the United States in the investigation of other persons | |
| in California." | |
| In the Phrack interview, Petersen makes no apologies for his choices in life. | |
| While discussing Petersen's role as an informant, Mike Bowen says, "I think | |
| that most hackers would have done the same as you." | |
| "Most hackers would have sold out their mother," Petersen responded. | |
| ------------------------------------------------------------------------------ | |
| Computer Criminal Caught After 10 Months on the Run August 30, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Keith Stone (Daily News) | |
| Convicted computer criminal Justin Tanner Petersen was captured Monday in | |
| Los Angeles, 10 months after federal authorities said they discovered he | |
| had begun living a dual life as their informant and an outlaw hacker. | |
| Petersen, 34, was arrested about 3:30 a.m. outside a Westwood apartment | |
| that FBI agents had placed under surveillance, said Assistant U.S. | |
| Attorney David Schindler. | |
| A flamboyant hacker known in the computer world as "Agent Steal," Petersen | |
| was being held without bail in the federal detention center in Los Angeles. | |
| U.S. District Court Judge Stephen V. Wilson scheduled a sentencing hearing | |
| for Oct. 31. | |
| Petersen faces a maximum of 40 years in prison for using his sophisticated | |
| computer skills to rig a radio contest in Los Angeles, tap telephone lines | |
| and enrich himself with credit cards. | |
| Monday's arrest ends Petersen's run from the same FBI agents with whom he | |
| had once struck a deal: to remain free on bond in exchange for pleading | |
| guilty to several computer crimes and helping the FBI with other hacker | |
| cases. | |
| The one-time nightclub promoter pleaded guilty in April 1993 to six federal | |
| charges. And he agreed to help the government build its case against Kevin | |
| Lee Poulsen, who was convicted of manipulating telephones to win radio | |
| contests and is awaiting trial on espionage charges in San Francisco. | |
| Authorities said they later learned that Petersen had violated the deal by | |
| committing new crimes even as he was awaiting sentencing in the plea | |
| agreement. | |
| On Monday, FBI agents acting on a tip were waiting for Petersen when he parked | |
| a BMW at the Westwood apartment building. An FBI agent called Petersen's | |
| name, and Petersen began to run, Schindler said. | |
| Two FBI agents gave chase and quickly caught Petersen, who has a prosthetic | |
| lower left leg because of a car-motorcycle accident several years ago. | |
| In April 1993, Petersen pleaded guilty to six federal charges including | |
| conspiracy, computer fraud, intercepting wire communications, transporting | |
| a stolen vehicle across state lines and wrongfully accessing TRW credit | |
| files. Among the crimes that Petersen has admitted to was working with other | |
| people to seize control of telephone lines so they could win radio | |
| promotional contests. In 1989, Petersen used that trick and walked away with | |
| $10,000 in prize money from an FM station, court records show. | |
| When that and other misdeeds began to catch up with him, Petersen said, he | |
| fled to Dallas, where he assumed the alias Samuel Grossman and continued | |
| using computers to make money illegally. | |
| When he as finally arrested in 1991, Petersen played his last card. | |
| "I called up the FBI and said: 'Guess what? I am in jail,' " he said. | |
| He said he spent the next four months in prison, negotiating for his freedom | |
| with the promise that he would act as an informant in Los Angeles. | |
| The FBI paid his rent and utilities and gave him $200 a week for spending | |
| money and medical insurance, Petersen said. | |
| They also provided him with a computer and phone lines to gather information | |
| on hackers, he said. | |
| Eventually, Petersen said, the FBI stopped supporting him so he turned to | |
| his nightclubs for income. But when that began to fail, he returned to | |
| hacking for profit. | |
| "I was stuck out on a limb. I was almost out on the street. My club | |
| was costing me money because it was a new club," he said. "So I did what | |
| I had to do. I an not a greedy person." | |
| [Broke, Busted, Distrusted. Turning in your friends leads to some | |
| seriously bad Karma, man. Negative energy like that returns ten-fold. | |
| You never know in what form either. You could end getting shot, | |
| thrown in jail, or worse, test HIV Positive. So many titty-dancers, | |
| so little time, eh dude? Good luck and God bless ya' Justin.] | |
| ----------------------------------------------------------------------------- | |
| Fugitive Hacker Baffles FBI With Technical Guile July 5, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by John Markoff (New York Times) | |
| [Mitnik, Mitnik, Mitnik, and more Mitnik. Poor bastard. No rest for | |
| the wicked, eh Kevin?] | |
| ----------------------------------------------------------------------------- | |
| Computer Outlaws Invade the Internet May 24, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Mike Toner (Atlanta Journal-Constitution) | |
| A nationwide wave of computer break-ins has law enforcement | |
| authorities scrambling to track down a sophisticated ring of | |
| "hackers" who have used the international "information | |
| highway," the Internet, to steal more than 100,000 passwords -- the | |
| electronic keys to vast quantities of information stored on | |
| government, university and corporate computer systems. | |
| Since the discovery of an isolated break-in last year at a | |
| single computer that provides a "gateway" to the Internet, | |
| operators of at least 30 major computer systems have found illicit | |
| password "sniffers" on their machines. | |
| The Federal Bureau of Investigation has been investigating the | |
| so-called "sniffer" attacks since February, but security experts | |
| say the intrusions are continuing -- spurred, in part, by the | |
| publication last month of line-by-line instructions for the | |
| offending software in an on-line magazine for hackers. | |
| Computer security experts say the recent rash of password piracy | |
| using the Internet is much more serious than earlier security | |
| violations, like the electronic "worm" unleashed in 1988 by | |
| Cornell University graduate student Robert Morris. | |
| "This is a major concern for the whole country," she says. | |
| "I've had some sleepless nights just thinking about what could | |
| happen. It's scary. Once someone has your ID and your password, | |
| they can read everything you own, erase it or shut a system down. | |
| They can steal proprietary information and sell it, and you might | |
| not even know it's gone." | |
| "Society has shifted in the last few years from just using | |
| computers in business to being absolutely dependent on them and the | |
| information they give us -- and the bad guys are beginning to | |
| appreciate the value of information," says Dain Gary, manager of | |
| the Computer Emergency Response Team (CERT), a crack team of | |
| software experts at Carnegie-Mellon University in Pittsburgh that | |
| is supported by the Defense Department's Advanced Research Projects | |
| Agency. | |
| Gary says the current rash of Internet crime appears to be the | |
| work of a "loosely knit but fairly organized group" of computer | |
| hackers adept not only at breaking and entering, but at hiding | |
| their presence once they're in. | |
| Most of the recent break-ins follow a similar pattern. The | |
| intruders gain access to a computer system by locating a weakness | |
| in its security system -- what software experts call an "unpatched | |
| vulnerability." | |
| Once inside, the intruders install a network monitoring program, | |
| a "sniffer," that captures and stores the first 128 keystrokes | |
| of all newly opened accounts, which almost always includes a user's | |
| log-on and password. | |
| "We really got concerned when we discovered that the code had | |
| been published in Phrack, an on-line magazine for hackers, on April | |
| 1," he says. "Putting something like that in Phrack is a little | |
| like publishing the instructions for converting semiautomatic | |
| weapons into automatics. | |
| Even more disturbing to security experts is the absence of a | |
| foolproof defense. CERT has been working with computer system | |
| administrators around the country to shore up electronic security, | |
| but the team concedes that such "patches" are far from perfect. | |
| [Look for plans on converting semiautomatic weapons into automatics | |
| in the next issue.] | |
| ------------------------------------------------------------------------------ | |
| Information Superhighwaymen - Hacker Menace Persists May 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| (Open Computing) (Page 25) | |
| Once again the Internet has been labeled a security problem. And a new | |
| breed of hackers has attracted attention for breaking into systems. | |
| "This is a group of people copying what has been done for years," says | |
| Chris Goggans, aka Erik Bloodaxe. "There's one difference: They don't | |
| play nice." | |
| Goggans was a member of the hacker gang called the Legion of Doom in the | |
| late '80s to early '90s. Goggans says the new hacking group, which goes | |
| by the name of "The Posse," has broken into numerous Business Week 1000 | |
| companies including Sun Microsystems Inc., Boeing, and Xerox. He says | |
| they've logged onto hundreds of universities and online services like | |
| The Well. And they're getting root access on all these systems. | |
| For their part, The Posse--a loose band of hackers--isn't talking. | |
| ------------------------------------------------------------------------------ | |
| Security Experts: Computer Hackers a Growing Concern July 22, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| New York Times News Wire (Virginian-Pilot and Ledger Star) (2A) | |
| Armed with increasing sophisticated snooping tools, computer programmers | |
| operating both in the United States and abroad have gained unauthorized | |
| access to hundreds of sensitive but unclassified government and military | |
| computer networks called Internet, computer security experts said. | |
| Classified government and military data, such as those that control | |
| nuclear weapons, intelligence and other critical functions, are not | |
| connected to the Internet and are believed to be safe from the types of | |
| attacks reported recently. | |
| The apparent ease with which hackers are entering military and government | |
| systems suggests that similar if not greater intrusions are under way on | |
| corporate, academic and commercial networks connected to the Internet. | |
| Several sources said it was likely that only a small percentage of | |
| intrusions, perhaps fewer than 5 percent, have been detected. | |
| ------------------------------------------------------------------------------ | |
| NSA Semi-confidential Rules Circulate | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Keay Davidson (San Francisco Examiner) (Page A1) | |
| It arrived mysteriously at an Austin, Texas, post office box by "snail | |
| mail" - computerese for the Postal Service. But once the National Security | |
| Agency's employee handbook was translated into bits and bytes, it took | |
| only minutes to circulate across the country. | |
| Thus did a computer hacker in Texas display his disdain for government | |
| secrecy last week - by feeding into public computer networks the | |
| semiconfidential document, which describes an agency that, during the darkest | |
| days of the Cold War, didn't officially "exist." | |
| Now, anyone with a computer, telephone, modem and basic computer skills | |
| can read the 36-page manual, which is stamped "FOR OFFICIAL USE ONLY" and | |
| offers a glimpse of the shadowy world of U.S. intelligence - and the personal | |
| price its inhabitants pay. | |
| "Your home, car pool, and public places are not authorized areas to | |
| conduct classified discussions - even if everyone involved in the discussion | |
| possesses a proper clearance and "need-to-know.' The possibility that a | |
| conversation could be overheard by unauthorized persons dictates the need to | |
| guard against classified discussions in non-secure areas." | |
| The manual is "so anal retentive and paranoid. This gives you some | |
| insight into how they think," said Chris Goggans, the Austin hacker who | |
| unleashed it on the computer world. His on-line nom de plume is "Erik | |
| Bloodaxe" because "when I was about 11, I read a book on Vikings, and that | |
| name really struck me." | |
| NSA spokeswoman Judi Emmel said Tuesday that "apparently this document is | |
| an (NSA) employee handbook, and it is not classified." Rather, it is an | |
| official NSA employee manual and falls into a twilight zone of secrecy. On | |
| one hand, it's "unclassified." On the other hand, it's "FOR OFFICIAL USE | |
| ONLY" and can be obtained only by filing a formal request under the U.S. | |
| Freedom of Information Act, Emmel said. | |
| "While you may take this handbook home for further study, remember that | |
| it does contain "FOR OFFICIAL USE ONLY' information which should be | |
| protected," the manual warns. Unauthorized release of such information could | |
| result in "appropriate administrative action ... (and) corrective and/or | |
| disciplinary measures." | |
| Goggans, 25, runs an on-line electronic "magazine" for computer hackers | |
| called Phrack, which caters to what he calls the "computer underground." He | |
| is also a computer engineer at an Austin firm, which he refuses to name. | |
| The manual recently arrived at Goggans' post office box in a white | |
| envelope with no return address, save a postmark from a Silicon Valley | |
| location, he says. Convinced it was authentic, he typed it into his computer, | |
| then copied it into the latest issue of Phrack. | |
| Other hackers, like Grady Ward of Arcata, Humboldt County, and Jeff | |
| Leroy Davis of Laramie, Wyo., redistributed the electronic files to computer | |
| users' groups. These included one run by the Cambridge, Mass.-based | |
| Electronic Frontier Foundation, which fights to protect free speech on | |
| computer networks. | |
| Ward said he helped redistribute the NSA manual "to embarrass the NSA" | |
| and prove that even the U.S. government's most covert agency can't keep | |
| documents secret. | |
| The action also was aimed at undermining a federal push for | |
| data-encryption regulations that would let the government tap into computer | |
| networks, Ward said. | |
| [Yeah...sure it was, Grady.] | |
| ------------------------------------------------------------------------------ | |
| Hackers Stored Pornography in Computers at Weapons Lab July 13, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Adam S. Bauman (Virginian-Pilot and Ledger-Star) (Page A6) | |
| One of the nation's three nuclear weapons labs has confirmed that | |
| computer hackers were using its computers to store and distribute | |
| hard-core pornography. | |
| The offending computer, which was shut down after a Los Angeles Times | |
| reporter investigating Internet hacking alerted lab officials, contained | |
| more than 1,000 pornographic images. It was believed to be the largest | |
| cache of illegal hardcore pornography ever found on a computer network. | |
| At Lawrence Livermore, officials said Monday that they believed at least | |
| one lab employee was involved in the pornography ring, along with an | |
| undetermined number of outside collaborators. | |
| [Uh, let me see if I can give this one a go: | |
| A horny lab technician at LLNL.GOV uudecoded gifs for days on end | |
| from a.b.p.e. After putting them up on an FSP site, a nosey schlock | |
| reporter blew the whistle, and wrote up a big "hacker-scare" article. | |
| The top-notch CIAC team kicked the horn-dog out the door, and began | |
| frantically scouring the big Sun network at LLNL for other breaches, | |
| all the while scratching their heads at how to block UDP-based apps | |
| like FSP at their firewall. MPEGs at 11. | |
| How does shit like this get printed????] | |
| ------------------------------------------------------------------------------ | |
| Clipper Flaw May Thwart Fed Effort June 6, 1994 | |
| by Aaron Zitner (Boston Globe) | |
| Patents, Technical Snares May Trip Up the 'Clipper' June 6, 1994 | |
| by Sharon Fisher (Communications Week) (Page 1) | |
| [Clipper, Flipper, Slipper. It's all a big mess, and has obsoleted | |
| itself. But, let's sum up the big news: | |
| How the Clipper technology is SUPPOSED to work | |
| 1) Before an encoded message can be sent, a clipper computer chip | |
| assigns and tests a scrambled group of numbers called a LEAF, for | |
| Law Enforcement Access Field. The LEAF includes the chip's serial | |
| number, a "session key" number that locks the message and a "checksum" | |
| number that verifies the validity of the session key. | |
| 2) With a warrant to wiretap, a law-enforcement agency like the FBI | |
| could record the message and identify the serial number of a Clipper | |
| chip. It would then retrieve from custodial agencies the two halves of | |
| that chip's decoding key. | |
| 3) Using both halves of the decoding key, the FBI would be able to | |
| unscramble the session key number, thus unlocking the messages or data | |
| that had been protected. | |
| How the Clipper technology is FLAWED (YAY, Matt Blaze!) | |
| 1) Taking advantage of design imperfections, people trying to defeat | |
| the system could replace the LEAF until it erroneously passed the | |
| "checksum" verification, despite an invalid session-key number. | |
| 2) The FBI would still be able to retrieve a decoding key, but it would | |
| prove useless. | |
| 3) Because the decoding key would not be able to unscramble the invalid | |
| session key, the message would remain locked.] | |