| ---[ Phrack Magazine Volume 8, Issue 53 July 8, 1998, article 14 of 15 | |
| -------------------------[ P H R A C K W O R L D N E W S | |
| --------[ Issue 53 | |
| Hi. A few changes have been made to Phrack World News (PWN). Because of | |
| the increase of news on the net, security, hackers and other PWN topics, | |
| it is getting more difficult to keep Phrack readers informed of everything. | |
| To combat this problem, PWN will include more articles, but only relevant | |
| portions (or the parts I want to make smart ass remarks about). If you would | |
| like to read the full article, look through the ISN (InfoSec News) archives | |
| located at: | |
| ftp.sekurity.org /pub/text/isn | |
| ftp.repsec.com /pub/text/digests/isn | |
| The following articles have been accumulated from a wide variety of places. | |
| When known, original source/author/date has been included. If the information | |
| is absent, then it wasn't sent to us. If you wish to receive more news, the | |
| ISN mail list caters to this. For more information, mail | |
| majordomo@sekurity.org with "info isn". To subscribe, mail | |
| majordomo@sekurity.org with "subscribe isn" in the body of the mail. | |
| As usual, I am putting some of my own comments in brackets to help readers | |
| realize a few things left out of the articles. Comments are my own, and | |
| do not necessarily represent the views of Phrack, journalists, government | |
| spooks, my cat, or anyone else. Bye. | |
| - disorder | |
| 0x1: Identifying Net Criminals Difficult | |
| 0x2: "The Eight" meet to combat high-tech crime | |
| 0x3: Fired Forbes Technician Charged With Sabotage | |
| 0x4: Internet Industry Asked to Police Itself | |
| 0x5: Internet may be Hackers Best Friend | |
| 0x6: Hacker Cripples Airport Tower | |
| 0x7: Profits Embolden Hackers | |
| 0x8: Cyberattacks spur new warning system | |
| 0x9: <pure lameness> | |
| 0xa: IBM's Ethical Hackers Broke In! | |
| 0xb: Two accused of conspiring to hack into CWRU system | |
| 0xc: FBI Warns of Big Increase In On-line Crime | |
| 0xd: Computer hacker jailed for 18 months | |
| 0xe: Afternoon Line | |
| 0xf: Hacking Geniuses or Monkeys | |
| 0x10: Low Tech Spooks - Corporate Spies | |
| 0x11: 'White Hat' Hackers Probe Pores in Computer Security Blankets | |
| 0x12: 101 Ways to Hack into Windows NT | |
| 0x13: Suspected NASA Hacker Nabbed | |
| 0x14: CEOs Hear the Unpleasant Truth about Computer Security | |
| 0x15: Codebreakers | |
| 0x16: Hackers Could Disable Military | |
| 0x17: Secret Service Hackers Can't Crack Internet | |
| 0x18: Now Hiring: Hackers (Tattoos Welcome) | |
| 0x19: Hacker Stoppers? | |
| 0x1a: Hackers' Dark Side Gets Even Darker | |
| 0x1b: Japan Fears It's Becoming a Base for Hackers | |
| 0x1c: Kevin Mitnick Hacker Case Drags On and On | |
| 0x1d: Millions Lost to Phone Hackers | |
| 0x1e: Hackers on the Hill | |
| 0x1f: RSA Sues Network Associates | |
| 0x20: Clinton to Outline Cyberthreat Policy | |
| 0x21: Programmer Sentenced for Military Computer Intrusion | |
| 0x22: Editorial - Hacker vs Cracker, Revisited | |
| 0x23: Windows NT Security Under Fire | |
| 0x24: New Decoy Technology Designed to Sting Hackers | |
| 0x25: Reno dedicates high-tech crime fighting center | |
| 0x26: Man poses as astronaut steals NASA secrets | |
| 0x27: Convention: Defcon 6.0 | |
| 0x28: Convention: Network Security Solutions July Event | |
| 0x29: Convention: 8th USENIX Security Symposium | |
| 0x2a: Convention: RAID 98 | |
| 0x2b: Convention: Computer Security Area (ASC) / DGSCA 98 | |
| 0x2c: Convention: InfoWarCon-9 | |
| 0x1>------------------------------------------------------------------------- | |
| Title: Identifying Net Criminals Difficult | |
| Source: 7Pillars Partners | |
| Author: David Plotnikoff (Mercury News Staff Writer) | |
| Date: 10:12 p.m. PST Sunday, March 8, 1998 | |
| [snip...] | |
| What began as an innocent chat-room flirtation isn't so innocent anymore. | |
| The last e-mail message you received began: ``I know where you live. I | |
| know where you work. I know where your kids go to day care. . . .'' | |
| Potential loss: Your life. | |
| There is no way to calculate how many hundreds or thousands of times each | |
| day the Net brings crime into some unsuspecting person's life. But a | |
| report released by the Computer Security Institute found that nearly | |
| two-thirds of the 520 corporations, government offices, financial | |
| institutions and universities queried had experienced electronic break-ins | |
| or other security breaches in the past 12 months. | |
| Although fewer than half the companies assigned a dollar amount to their | |
| losses, the estimated total from those that did is staggering: $236 | |
| million for the last two years. | |
| [More estimates on losses, no doubt from accurate estimations | |
| by professionals.] | |
| [snip...] | |
| But those charged with enforcing the law in cyberspace say the vast | |
| majority of Net-borne crime never reaches the criminal justice system. And | |
| in the relatively few instances where a crime is reported, most often the | |
| criminal's true identity is never found. | |
| The San Jose Police Department's elite high-tech crimes unit is every | |
| citizen's first line of defense when trouble comes down the wire in the | |
| capital city of Silicon Valley. But today, four years after the explosion | |
| of the Internet as a mass market, even the top technology-crimes police | |
| unit in the country finds itself with just a handful of Internet crimes to | |
| investigate. | |
| [Wait... they say criminals get away with everything, then call the | |
| Police an "elite" high-tech crimes unit?] | |
| [snip...] | |
| The Internet slice of the job -- chasing down hackers, stalkers and | |
| assorted scammers -- is too small to even keep statistics on. When pressed | |
| for a guess, Sgt. Don Brister, the unit's supervisor, estimates that | |
| Internet and online-service crimes make up ``probably no more than 3 or 4 | |
| percent'' of the team's workload. | |
| [snip...] | |
| While most Net crimes are actually old crimes -- stalking, harassment, | |
| fraud and theft -- in a new venue, there is at least one criminal act | |
| entirely native to cyberia: ``denial of service'' attacks. | |
| [Route, you're such a criminal.] | |
| [snip...] | |
| ``The scary part,'' Lowry says, ``is we know the storm is coming, but we | |
| don't know exactly what shape it's going to take. The scale is huge. . . . | |
| You're sitting on this beach, knowing it's going to hit, but you don't | |
| know what it is or when it's going to hit.'' | |
| 0x2>------------------------------------------------------------------------- | |
| Title: "The Eight" meet to combat high-tech crime | |
| Date: Jan 1998 | |
| Recently, U.S. Attorney General Janet Reno hosted a historic meeting of | |
| Justice and Interior officials from the countries that constitute "the | |
| Eight" on ways to combat international computer crime. (Formerly dubbed | |
| the G-7, the group now includes Russia along with the United Kingdom, | |
| France, Germany, Italy, Canada, Japan, and the U.S.) | |
| The meeting was the first of its kind and resulted in an agreement | |
| endorsing ten principles, such as "Investigation and prosecution of | |
| international high-tech crimes must be coordinated among all concerned | |
| states, regardless of where harm has occurred;" and adopting a ten-point | |
| action plan, for example, "Use our established network of knowledgeable | |
| personnel to ensure a timely, effective response to transnational | |
| high-tech cases and designate a point-of-contract who is available on a 24 | |
| hour basis." | |
| The full text will be available at http://www.usdoj.gov. | |
| 0x3>------------------------------------------------------------------------- | |
| Title: Fired Forbes Technician Charged With Sabotage | |
| Source: Dow Jones News Service | |
| Date: 11/25/97 | |
| A temporary staff computer technician has been charged with breaking into | |
| the computer system of Forbes, Inc., publisher of Forbes magazine, and | |
| causing a computer crash that cost the company more than $100,000. | |
| According to the complaint against George Mario Parente, the sabotage | |
| left hundreds of Forbes employees unable to perform server-related | |
| functions for a full day and caused many employees to lose a day's worth | |
| of data. If convicted, Parente faces up to five years in prison and a | |
| maximum fine of $250,000. | |
| 0x4>------------------------------------------------------------------------- | |
| Title: Internet Industry Asked to Police Itself | |
| SEATTLE -- The Internet industry had better police itself or it will face | |
| renewed threats of government regulation, participants said Wednesday at a | |
| Seattle conference of technology leaders from throughout North America as | |
| well as Europe and Japan. | |
| [And they've done such a good job so far, with legislation like the CDA | |
| and WIPO... sure, we can trust the government to do the right thing.] | |
| [snip...] | |
| Balkam warned that Arizona Sen. John McCain plans hearings next month on | |
| the topic, and that Indiana Sen. Dan Coats plans to introduce a new | |
| content-regulation bill designed to avoid the problems that caused the | |
| Supreme Court to reject the first one. | |
| [Everyone keep your eyes peeled.] | |
| Wednesday's discussion was well-timed; the conference will hear Thursday | |
| from President Clinton's Internet czar, Ira Magaziner, who is expected to | |
| deliver a stern admonition that government won't hesitate to step in if | |
| the industry's own efforts fall short. | |
| Sponsored by GTE, Telus Corp. and the Discovery Institute, the program | |
| also included Rep. Rick White, R-Washington, founder of the Congressional | |
| Internet Caucus and Rob Glaser, founder of Seattle-based RealNetworks and | |
| a proponent of the Internet as the ``next mass medium.'' | |
| While Wednesday's sessions focused on content regulation, Thursday's deal | |
| more with electronic commerce and such issues as privacy, authentication | |
| and legal jurisdiction. | |
| Effective self-regulation has several keys, said Jim Miller, architect of | |
| a system known as PICS, the Platform for Internet Content Selection. | |
| [snip...] | |
| 0x5>------------------------------------------------------------------------- | |
| Title: Internet may be Hackers Best Friend | |
| The Internet may be the computer hacker's best friend. The international | |
| computer network has made the sharing of sophisticated break-in tools | |
| easier, computer security experts say. | |
| [But they don't mention the sharing of security information, or the fact | |
| that the experts can subscribe to the same 'hacker' sharing sources.] | |
| [snip...] | |
| A report released Wednesday by the Computer Security Institute noted that | |
| while both external and internal computer crime is on the rise, the | |
| greatest losses result from unauthorized access by insiders. | |
| ``Those are the attacks that cause tens of millions of dollars,'' Power | |
| said. | |
| But it's still the outside jobs that grab headlines. A Defense Department | |
| official last week termed the attack linked to the young hackers ``the | |
| most organized and systematic attack the Pentagon has seen to date.'' | |
| [snip...] | |
| 0x6>------------------------------------------------------------------------- | |
| Title: Hacker Cripples Airport Tower | |
| A juvenile hacker who crippled an airport tower for six hours, damaged a | |
| town's phone system, and broke into pharmacy records has been charged in a | |
| first-ever federal prosecution, the U.S. Attorney's office announced | |
| today. | |
| But in a plea bargain, the juvenile will serve no jail time, the | |
| government announced. | |
| The incidents occurred in early 1997, but the federal criminal charges | |
| were unsealed just today. The government said it was the first federal | |
| prosecution ever of a minor for a computer crime. | |
| According to U.S. Attorney Donald K. Stern, the hacker disabled a key | |
| telephone company computer servicing the Worcester airport, roughly 45 | |
| miles southwest of Boston. | |
| "As a result of a series of commands sent from the hacker's personal | |
| computer, vital services to the FAA control tower were disabled for six | |
| hours in March of 1997," a release from Stern's office said. | |
| [So the FAA routes vital tower control through the PSTN? Scary...] | |
| [snip...] | |
| The plea agreement sentences the juvenile to two years' probation, "during | |
| which he may not possess or use a modem or other means of remotely | |
| accessing a computer or computer network directly or indirectly," | |
| according to Stern | |
| In addition, he must pay restitution to the telephone company and complete | |
| 250 hours of community service. He has been required to forfeit all of the | |
| computer equipment used during his criminal activity. | |
| [snip...] | |
| "Public health and safety were threatened by the outage, which resulted in | |
| the loss of telephone service, until approximately 3:30 p.m., to the | |
| Federal Aviation Administration Tower at the Worcester Airport, to the | |
| Worcester Airport Fire Department, and to other related concerns such as | |
| airport security, the weather service, and various private air freight | |
| companies. | |
| "Further, as a result of the outage, both the main radio transmitter, | |
| which is connected to the tower by the loop carrier system, and a circuit, | |
| which enables aircraft to send an electric signal to activate the runway | |
| lights on approach, were not operational for this same period of time." | |
| [NICE design guys... real nice.] | |
| [snip...] | |
| 0x7>------------------------------------------------------------------------- | |
| Title: Profits Embolden Hackers | |
| Source: InternetWeek | |
| Author: Tim Wilson | |
| Conventional wisdom says that most IT security threats come from inside | |
| the company, not outside. Any guess who's reaping the greatest benefit | |
| from that little piece of wisdom? | |
| Hackers and computer criminals. | |
| In two separate studies completed this month, Fortune 1000 companies | |
| reported more financial losses due to computer vandalism and espionage in | |
| 1997 than they ever experienced before. Several corporations said they | |
| lost $10 million or more in a single break-in. And reports of system | |
| break-ins at the Computer Emergency Response Team site are the highest | |
| they've ever been. | |
| Despite recent security product and technology developments, computer | |
| networks are becoming more vulnerable to outside attack, not less. | |
| [Woohoo!] | |
| [snip...] | |
| "I know about 95 percent of [the vulnerabilities] I am going to find at a | |
| company before I even get there," said Ira Winkler, president of the | |
| Information Security Advisory Group -- a firm that specializes in | |
| penetrating business security systems to expose vulnerabilities -- and | |
| author of the book Corporate Espionage. "I can steal a billion dollars | |
| from any [corporation] within a couple of hours." | |
| [One trick pony...] | |
| [snip...] | |
| In a study to be published next month, WarRoom Research found that the | |
| vast majority of Fortune 1000 companies have experienced a successful | |
| break-in by an outsider in the past year. More than half of those | |
| companies have experienced more than 30 system penetrations in the past 12 | |
| months. Nearly 60 percent said they lost $200,000 or more as a result of | |
| each intrusion. | |
| In a separate study published earlier this month by the Computer Security | |
| Institute and the FBI, 520 U.S. companies reported a total loss of $136 | |
| million from computer crime and security breaches in 1997, an increase of | |
| 36 percent from the year before. The Internet was cited by 54 percent of | |
| the respondents as a frequent point of attack, about the same percentage | |
| of respondents that cited internal systems as a frequent point of attack. | |
| [snip...] | |
| What You Can Do | |
| One universal piece of advice came from hackers, hackers for hire and | |
| those who collect computer crime data: When your vendor issues a software | |
| patch, install it immediately. | |
| "The biggest mistake people make is that they underestimate the threat," | |
| Moss said. "They don't put in the patches, they misconfigure their | |
| firewalls, they misconfigure routers." | |
| [snip...] | |
| 0x8>------------------------------------------------------------------------- | |
| Title: Cyberattacks spur new warning system | |
| Author: Heather Harreld | |
| Date: March 23, 1998 | |
| The Defense Department has created a new alert system to rate the level of | |
| threats to its information systems that mirrors the well-known Defense | |
| Conditions (DEFCONs) ratings that mark the overall military status in | |
| response to traditional foreign threats. | |
| The new Information Conditions, or "INFOCONs," are raised and lowered | |
| based upon cyberthreats to DOD or to the U.S. Strategic Command (Stratcom) | |
| at Offutt Air Force Base in Nebraska. Stratcom is responsible for | |
| deterring any military attack on the United States and for deploying | |
| troops or launching nuclear weapons should deterrence fail, a Stratcom | |
| spokesman said. As INFOCONs are raised, officials take additional measures | |
| to protect information systems. | |
| [snip...] | |
| Officials at Stratcom have developed detailed guidelines on raising and | |
| lowering INFOCONs based on the threat. Structured, systematic attacks to | |
| penetrate systems will result in a higher INFOCON level than when | |
| individual, isolated attempts are made, according to Stratcom. | |
| [snip...] | |
| 0x9>------------------------------------------------------------------------- | |
| Title: <pure lameness> | |
| Source: "Betty G.O'Hearn" <betty@infowar.com> | |
| Infowar.Com was notified today by the "Enforcers" Computer Hackers Group, | |
| that an agreement was reached with chief negotiator Ian A. Murphy, aka | |
| Capt. Zap, to cease and desist their cyber destruction witnessed in the | |
| recent attacks and intrusions that have rocked the Internet in past weeks. | |
| The Enforcers began their massive assault on corporate and military | |
| websites after the arrest of "Pentagon Hackers" here in the US and Israel. | |
| Ian Murphy, CEO of IAM/Secure Data Systems, and the first US hacker | |
| arrested back in 1981, issued press releases during negotiations. (see | |
| www.prnewswire.com) Murphy began the process to begin deliberations out of | |
| a sense of duty. Murphy's dialogue with members of the Enforcer group | |
| pointed to the fact that the destruction was counter productive. He urged | |
| the group to consider halting this activity. "The destruction of | |
| information systems for an alleged cause is not the way to go about such | |
| things in defense of Hackers and Crackers." | |
| [Who made Ian Murphy chief negotiator? Why wasn't I notified so I | |
| could talk to these wankers? This is the kind of pathetic shit | |
| that makes PRNewswire the pond scum of journalism. In case you couldn't | |
| tell, this is pure media hype designed to get more business for | |
| Murphy and CO.] | |
| [snip...] | |
| Statement from a Enforcers representative is below. | |
| [HTML tags have been removed.] | |
| From: Adam <<adamb1@flash.net> | |
| Reply-To: adamb1@flash.net | |
| Date: March 26, 1998 | |
| Organization: Adam's Asylum | |
| To: "Betty G.O'Hearn" <<betty@infowar.com> | |
| Subject: Enforcers Press Release/Announcement | |
| STATEMENT OF THE ENFORCERS | |
| We, the Enforcers, have decided that it would be in the best interest of | |
| the hacking community and the security community at large to cease and | |
| desist all web site hacking of external businesses as advised by Mr. Ian | |
| Murphy (Captain Zap.) We agree that our actions are not productive and are | |
| doing more harm than good towards the security community. | |
| Therefore, as an agent of the Enforcers, I hereby state that all web site | |
| hacks on external sites will be immediately halted. We feel that there | |
| will be other avenues opening to achieve our goal of a substantial | |
| reduction in child pornography and racist web sites and netizens. We also | |
| support the larger goals of the hacker community and in the future we will | |
| work to augment the public's view rather than detract from it. All members | |
| of Enforcers who hacked the web sites have agreed to this release and will | |
| stop hacking external web sites. | |
| [13:51 GMT -0600 26 March 1998] | |
| We thank you for your time and assistance in this matter. | |
| We congratulate both Mr. Murphy and The Enforcers for their diligence in | |
| reaching this agreement. This is indeed an act of peace in our cyberworld. | |
| [This is indeed an act which causes illness to stomach.] | |
| 0xa>------------------------------------------------------------------------- | |
| Title: IBM's Ethical Hackers Broke In! | |
| TUCSON, Ariz. (March 23, 1998 8:30 p.m.) - International Business Machines | |
| Corp.'s team of "ethical hackers" successfully broke into an unnamed | |
| company's computer network in a demonstration of a live attack at a | |
| computer industry conference. | |
| [They make it sound like this is a big event. "Look guys! We | |
| actually broke in!#$!"] | |
| [snip...] | |
| Palmer said IBM charges between $15,000 to $45,000 to perform a hack of a | |
| company's system, with its permission, to test its security. Palmer said | |
| because hacking is a felony, its clients sign a contract that he calls a | |
| "get out of jail free card" specifying what IBM is allowed to do. | |
| The IBM team, which has an 80 percent success rate in electronic | |
| break-ins, is not a team of reformed hackers and Palmer warned the | |
| audience that hiring former hackers can be very dangerous, and not worth | |
| the risk. | |
| [*BULLSHIT* .. IBM hires hackers.. IBM hires hackers.. secret is out, | |
| nyah nyah.] | |
| [snip...] | |
| He said that there are currently about 100,000 hackers worldwide, but that | |
| about 9.99 percent of those hackers are potential professional hired | |
| hackers, who may be involved in corporate espionage, and .01 percent are | |
| world class cyber criminals. Ninety percent are amateurs who "cyber" | |
| joyride." | |
| [snip...] | |
| 0xb>------------------------------------------------------------------------- | |
| Title: Two accused of conspiring to hack into CWRU system | |
| Source: Plain Dealer Reporter | |
| Author: Mark Rollenhagen | |
| Date: Thursday, March 26, 1998 | |
| A federal grand jury yesterday indicted two Cleveland Heights residents on | |
| felony computer hacking charges. | |
| Rebecca L. Ching, 27, and Jason E. Demelo, 22, who authorities said live | |
| in an apartment on Mayfield Rd., are accused of conspiring to hack into | |
| the computer system at Case Western Reserve University between October | |
| 1995 and June 1997. | |
| Ching was a systems administrator for a computer system on the CWRU campus | |
| network during at least a portion of the conspiracy, the indictment said. | |
| She is accused of helping Demelo hack into the CWRU system by directing | |
| him to install a "sniffer" program capable of intercepting electronic | |
| information, including user names and passwords. | |
| Federal prosecutors would not say why Ching and Demelo allegedly sought | |
| to hack into the system. | |
| Neither could be reached to comment. | |
| Tom Shrout, director of communications for CWRU, said Ching worked part | |
| time for the university in its information sciences division three or four | |
| years ago. | |
| The case is believed to be the first federal computer hacking case brought | |
| in Northern Ohio since the FBI organized a computer crime unit last year. | |
| Demelo is also charged with seven counts of illegally intercepting | |
| electronic communications sent to other universities, including Cleveland | |
| State University, George Mason University and the University of Minnesota, | |
| and Internet providers, including Modern Exploration, APK Net Ltd., and | |
| New Age Consulting Service, and Cyber Access, a software company. | |
| 0xc>------------------------------------------------------------------------- | |
| Title: FBI Warns of Big Increase In On-line Crime | |
| [Hrm.. wonder if it is time to get next year's budget?!] | |
| WASHINGTON (March 25, 1998 00:19 a.m. EST) -- Criminal cases against | |
| computer hackers have more than doubled this year as the ranks of teenage | |
| hackers were joined by industrial spies and foreign agents, the FBI warned | |
| Tuesday. | |
| [Cases have doubled... no word on convictions.. hrm...] | |
| The FBI told a congressional Joint Economic Committee hearing that it had | |
| recorded a significant increase in its pending cases of computer | |
| intrusions, rising from 206 to 480 this year. | |
| [snip...] | |
| Michael Vatis, head of the FBI's national infrastructure protection | |
| center, said: "Although we have not experienced the electronic equivalent | |
| of a Pearl Harbor or Oklahoma City, as some have foretold, the statistics | |
| and our cases demonstrate our dangerous vulnerabilities to cyber attacks." | |
| [snip...] | |
| He told how one hacker had broken into telephone systems in Massachusetts | |
| to cut off communications at a regional airport and disconnect the control | |
| tower last year. Last week a teenager agreed to serve two years' probation | |
| after pleading guilty to disrupting communications at the Worcester, | |
| Mass., airport for six hours. | |
| Another hacker in Florida is accused of breaking into the 911 emergency | |
| phone system last year and jamming all emergency services calls in the | |
| region. | |
| The FBI said the dangers of cybercrime were rising because of the | |
| increased availability of hacking tools on the Internet, as well as | |
| electronic hardware such as radio frequency jamming equipment. | |
| Last week Deputy Defense Secretary John Hamre toured European governments | |
| to warn of the risks of computer crime and discuss possible | |
| counter-measures. | |
| In spite of the publicity surrounding hackers, industrial espionage | |
| remains the most costly source of cybercrime, the committee heard Tuesday. | |
| Last July an unnamed computer communications company sent a malicious | |
| computer code which diverted communications from one of its rivals. The | |
| FBI estimated the victim company suffered losses of more than $1.5 | |
| million. | |
| Other FBI officials told how the U.S. was increasingly the subject of | |
| economic attack by foreign governments using computers. Larry Torrence, of | |
| the FBI's national security division, said foreign agents were | |
| "aggressively targeting" proprietary business information belonging to | |
| U.S. companies. | |
| More frequently, criminals are using the Internet to defraud potential | |
| investors with bogus investment schemes and banks. | |
| Fraudulent schemes on the Internet were becoming "epidemic," said Neil | |
| Gallagher, of the FBI's criminal division. One pyramid scheme, called | |
| Netware International, had recruited 2,500 members across the country by | |
| promising to share profits of 25 percent a year in a new bank which it was | |
| claiming to form. | |
| Investigators said they had seized almost $1 million to date. | |
| 0xd>------------------------------------------------------------------------- | |
| Title: Computer hacker jailed for 18 months | |
| Date: Friday, March 27, 1998 | |
| A computer hacker who tried to destroy an Internet company that refused to | |
| hire him was jailed for 18 months today for offences that include | |
| publishing customer credit card numbers. | |
| In the NSW District Court, Judge Cecily Backhouse said Skeeve Stevens | |
| seriously damaged AUSnet, which has since gone out of business, by | |
| compromising 1,225 credit cards and by prominently displaying a message on | |
| its homepage on the World Wide Web. | |
| The April 1995 message included: "So dont (sic) be surprised if all you | |
| (sic) cards have millions of dollars of shit on them ... AUSNET is a | |
| disgusting network ... and should be shut down and sued by all their | |
| users!" | |
| Stevens, 26, pleaded guilty to inserting data into a computer system in | |
| Sydney in April 1995 and asked the judge to take into account another | |
| eight offences, including accessing confidential information. | |
| [snip...] | |
| The judge said Stevens' actions caused serious harm to the goodwill of | |
| AUSnet, whose staff had to answer non-stop calls from angry customers - | |
| many of whom cancelled their accounts - and who had to deal with crippling | |
| effects of their cash flows. | |
| Judge Backhouse said general deterrence was important in this type of | |
| offence, which was very hard to detect. | |
| She jailed him for three years, but ordered him to be released on a | |
| recognisance after 18 months. - Australian Associated Press *Australian | |
| Eastern Daylight Time (AEDT) is 11 hours ahead of Greenwich Mean Time. | |
| 0xe>------------------------------------------------------------------------- | |
| Title: Afternoon Line | |
| Source: The Netly News | |
| Author: Declan McCullah | |
| Date: March 24, 1998 | |
| Technology is one of those issues where lawmakers vie to sound as dumb as | |
| possible. At a "cyber-theft" hearing this morning, Rep. Jim Saxton | |
| (R-N.J.) said that his only knowledge about computers dates back to when | |
| his printer had a cover "to shield our ears from the noise." Could the | |
| witnesses from the FBI please explain the problems they had with this | |
| newfangled Internet? Sure, replied Michael Vatis, the head of the National | |
| Infrastructure Protection Center: "There are hacker web sites" out there, | |
| he said, with software that lets you "click on a button to launch an | |
| attack." The fact that Carnegie Mellon University's CERT center reported a | |
| 20 percent reduction in attacks from 1996 to 1997 didn't faze him. The | |
| real problem, Vatis griped, is "people out there who still romanticize | |
| hackers as kids just having fun. [What about] the elderly person who can't | |
| get through to 911 in an emergency because of a hacker?" Joining Vatis in | |
| testifying before Congress' Joint Economic Committee were top FBI honchos | |
| Larry Torrence and Neil Gallagher. Nobody representing civil liberties | |
| groups, computer security organizations, or high tech companies was | |
| invited to speak. --By Declan McCullagh/Washington | |
| [...] | |
| Witness at the Persecution | |
| Then again, there's a job opportunity in Los Angeles for someone with | |
| top-notch skills in telecommunications, system and network administration, | |
| and computer security -- and you won't even have to turn on a computer. | |
| The lawyer for renown hacker Kevin Mitnick is looking for an expert | |
| witness to testify at his client's trial, and has issued a sort of want-ad | |
| press release. "Qualified candidates must have an advanced degree and be | |
| knowledgeable in DOS, Windows, SunOS, VAX/VMS and Internet operations," | |
| the job description reads. Oh well, they lost me after "qualified," but | |
| with Uncle Sam paying the tab it could be the perfect opportunity for | |
| someone with a taste for the spotlight and nothing on their agenda | |
| starting as early as March 30. | |
| 0xf>------------------------------------------------------------------------- | |
| Title: Hacking Geniuses or Monkeys | |
| Source: ZDTV | |
| Author: Ira Winkler | |
| Date: March 30, 1998 | |
| By now everyone has heard about the Pentagon hacks-- and the ensuing | |
| arrests of two teenagers in Cloverdale, Calif., and The Analyzer, the | |
| Israeli claiming to be the superhacking mentor of the Cloverdale teens. | |
| There were also two other Israelis arrested at the same time. | |
| The media and Websites like antionline.com portrayed the criminals as | |
| geniuses. I never heard of these supposed geniuses before, but the one | |
| thing that went through my mind was a quote by Scott Charney, Chief of the | |
| Department of Justice Computer Crime and Intellectual Property Unit: "Only | |
| the bad ones get caught." | |
| I wanted the inside scoop, so I talked to some real hackers, who are | |
| really considered "elite" within the hacking community. These are people | |
| who have been hacking for over a decade and can take control of any system | |
| that they want. They invent the hacks that the wannabes find tools to | |
| accomplish. | |
| The opinion of the elite varied little: "The hackers involved in the | |
| Pentagon and ensuing hacks are clueless." | |
| Bad hackers are clueless | |
| Why are the Pentagon hackers clueless? In the first place, they were | |
| caught. | |
| The inside scoop is that the Pentagon hackers did nothing to cover their | |
| tracks and used the same routes of access again and again, making their | |
| capture inevitable. In short, they failed the basics of Criminal Hacking | |
| 101. | |
| The true act of stupidity, however, was talking to the press and being | |
| totally unrepentant about their actions. They even bragged about it. This | |
| is like asking the FBI, "Please prosecute me." | |
| While the Department of Justice doesn't usually prosecute juveniles, the | |
| teenagers were almost daring them to. Then The Analyzer jumped in, | |
| threatening to wreak havoc on the entire Internet if the teenagers were | |
| pursued. A week later he was arrested. | |
| Skilled hackers remember the arrest of the people who hacked the DoJ and | |
| CIA webpages. The lesson: if you leave any tracks while embarrassing the | |
| US Government, you will be caught. | |
| The hacking inner circle told me that The Analyzer did not cover his | |
| tracks at all, and his capture was easy, even though it spanned | |
| international lines. And how skillful are The Analyzer and the Pentagon | |
| hackers? According to my sources, almost all the hacks were accomplished | |
| via a tool that automatically exploited the rstatd problem. | |
| You really don't have to know what the rstatd problem means. The best | |
| analogy is that the Pentagon hackers found a master key on the street and | |
| tried it on every lock that they could find. Unfortunately, there are tens | |
| of thousands of "locks" that the master key fits. This is hardly the sign | |
| of a computer genius, according to the elite. | |
| Who is The Analyzer, anyway? | |
| The real hackers then wondered why they have never heard of The Analyzer | |
| before. The talented hackers do seem to know each other or at least hear | |
| about the "rising stars" of the community. The Analyzer never fit this | |
| category. Nor did anyone recognize him when his picture was wired around | |
| the world. | |
| And what about the language that the Pentagon hackers and The Analyzer | |
| used in their unwise interviews? | |
| The Analyzer threatened to damage "Internet servers." Apparently, real | |
| hackers don't use this term, it is too mainstream. The California | |
| teenagers were quoted as saying that the reason they hacked was, "Power." | |
| Among the elite, real power is the anonymous and undetected control of a | |
| computer. Needless to say, the Pentagon hackers were not anonymous or | |
| undetected. I wonder how "powerful" they will feel in prison. | |
| It didn't surprise my hacker friends when another group of hackers, | |
| calling themselves The Enforcers, jumped on the bandwagon. These people | |
| threatened to hack computers all over the world in retaliation for the | |
| capture of The Analyzer and the Cloverdale teens. Of course, The | |
| Enforcers' self-proclaimed leader used the same email address to put out | |
| his statements and respond to queries from the media-- making himself and | |
| his group easy targets for federal attention. | |
| The only reasons he may not be arrested is that his group hasn't caused | |
| any real damage, and the FBI has more important problems to deal with than | |
| wannabe hackers looking for their 15 minutes of fame. | |
| Hacker wannabes | |
| I'm really getting sick of the Pentagon hacking stories, and all the | |
| wannabe hackers clamoring for their moment in the spotlight. Perhaps, when | |
| the FBI starts actively prosecuting juveniles and other people for | |
| hacking-related crimes, these wannabes will start using their computers in | |
| more productive ways. | |
| More importantly, maybe the media will stop portraying anyone who can hack | |
| a computer as some sort of genius. As I have said before, and as the real | |
| hackers can confirm, I can train a monkey to break into a computer in a | |
| few hours. The Pentagon hackers have displayed no more talents than the | |
| monkeys of which I speak. On the other hand, the fact that they can break | |
| into Pentagon computers makes the Department of Defense look like monkeys | |
| as well. | |
| The fact that the media continues to paint these wannabes as geniuses | |
| makes them worse than monkeys. | |
| 0x10>------------------------------------------------------------------------- | |
| Title: Low Tech Spooks - Corporate Spies | |
| Source: Forbes | |
| Author: Adam L. Penenberg | |
| In his slightly crumpled brown uniform, Richard Jones looked like any | |
| typical deliveryman, bringing in a new batch of urgently needed office | |
| supplies to corporations everywhere. But Jones, who was heading for the | |
| parking lot of a major chipmaker's border town maquiladora, only looked | |
| the part. Everything about him that day was made up. | |
| His uniform, "A close match, but not perfect," he would recall later, the | |
| office supplies--paper, pens and toner cartridges--picked up from a local | |
| stationery store. Even his name was fictional. | |
| As Jones took a final deep breath and carried the supplies into the | |
| company's air-conditioned chill, a security guard took one look at the | |
| brown uniform and lazily waved him through to the office manager's office. | |
| Jones had already contacted the delivery company and, pretending to be | |
| from the semiconductor company, had canceled that week's delivery run. | |
| [snip...] | |
| And that was that. The office manager showed Jones around the entire | |
| premises, pointing out photocopiers, fax machines, bookshelves, supply | |
| cabinets that had to be resupplied and the offices of executives. She even | |
| got him coffee. | |
| What was the point of the charade? Jones, not his real name, is a | |
| corporate spook. A rival company had paid him to obtain the semiconductor | |
| company's forthcoming quarterly earnings before they were announced. The | |
| fee: a nifty $35,000. | |
| [snip...] | |
| Many former Central Intelligence Agency, National Security Agency and | |
| Defense Intelligence Agency employees have sought refuge in the corporate | |
| world, often heading their own companies. They even have their own trade | |
| organization: the Society of Competitor Intelligence Professionals, or | |
| SCIPs. | |
| [You must have proper ID and know the secret handshake to join.] | |
| "The scope of the problem is enormous," says Ira Winkler, security | |
| consultant and author of Corporate Espionage. "On any one day there are a | |
| few hundred people engaged in breaking into companies and stealing | |
| information in this country. I can literally walk into a company and | |
| within a few hours walk out with billions of dollars." | |
| [One trick pony...] | |
| [snip...] | |
| 0x11>------------------------------------------------------------------------ | |
| Title: 'White Hat' Hackers Probe Pores in Computer Security Blankets | |
| Source: Washington Post | |
| Author: Pamela Ferdinand | |
| Date: April 4, 1998 | |
| BOSTON: In a chaotic room crammed with computer terminals and circuit | |
| boards, a long-haired man in black jeans -- "Mudge" by his Internet handle | |
| -- fiddles with the knobs of a squawking radio receiver eavesdropping on | |
| the beeps and tones of data transmissions. | |
| Nearby, a baby-faced 22-year-old in a baggy sweat shirt, nicknamed | |
| "Kingpin," analyzes reams of coded equations to break password sequences | |
| percolating on his computer screen. Other figures with equally cryptic | |
| identities toil in an adjoining chamber, their concentrated faces lit only | |
| by a monitor's glare and the flicker of silent television sets. | |
| This is the L0pht, pronounced "loft," a techie operations center in a | |
| suburban warehouse several miles from city center that is inhabited by a | |
| group whose members have been called rock stars of the nation's | |
| computer-hacking elite. | |
| The seven members of this computer fraternity-cum-high tech clubhouse have | |
| defeated some of the world's toughest computer and telecommunications | |
| programs and created security software that is the gold standard of | |
| corporate and hacking worlds. By day, they are professional computer | |
| experts, mostly in their twenties and thirties, with jobs and even wives. | |
| By night, they retreat to the warehouse and their electronic aliases troll | |
| the Internet for security gaps. | |
| Hacking mostly for the challenge, they have exposed security flaws in | |
| Microsoft Corp.'s leading network operating system, revealed holes in | |
| Lotus software and figured out how to decode pager messages and mobile | |
| police terminal data, among other feats. | |
| Hackers typically get into supposedly secure computer systems and pinpoint | |
| security breaches by deciphering elaborate number, letter and symbol | |
| combinations designed by manufacturers to protect their products. If | |
| security is breached, users risk having everything from private e-mail | |
| read to databases erased. | |
| A single, unintentional hack is not illegal, the U.S. attorney general's | |
| office here says. But repeat intruders face criminal penalties, especially | |
| when they compromise and damage confidential government, military or | |
| financial information. | |
| [Hrm.. such nice vague wording. Break in one time (the first time), | |
| and it isn't illegal?!] | |
| [snip...] | |
| L0pht members pride themselves on a less invasive and more altruistic goal | |
| just this side of the law: To locate and document Internet security gaps | |
| for free for the sake of consumers who have been led to believe their | |
| online transactions are secure. | |
| "We think of our Net presence as a consumer watchdog group crossed with | |
| public television," said "Mudge," a professional cryptographer by day who | |
| declined to identify himself for security reasons. "At this point, we're | |
| so high profile . . . it would be ludicrous for us to do anything wrong." | |
| Even companies whose products have been hacked for security weaknesses | |
| laud the social ethos and technical prowess of the members of the L0pht, | |
| who frequently notify manufacturers and recommend fixes before going | |
| public with their finds. Unlike villainous hackers labeled "black hats," | |
| who probe cyberspace for profit and malice, Robin Hood-style "white hats" | |
| like the L0pht are generally accorded respect, and even gratitude. | |
| [snip...] | |
| In the L0pht's most widely publicized hack, "Mudge" and a colleague | |
| assaulted Microsoft's Windows NT operating system last year and found | |
| inherent flaws in the algorithm and method designed to hide user | |
| passwords. They demonstrated the security breach by posting their | |
| victorious code on the Internet and showing how it was possible to steal | |
| an entire registry of passwords in roughly 26 hours, a task Microsoft | |
| reportedly claimed would take 5,000 years. | |
| "It's big. It's bad. It cuts through NT passwords like a diamond tipped, | |
| steel blade," boasts advertising for the latest version of their | |
| security-auditing tool, dubbed "L0phtcrack." "It ferrets them out from the | |
| registry, from repair disks, and by sniffing the net like an anteater on | |
| dexadrene." | |
| Microsoft took notice and, in an unprecedented move, executives invited | |
| the L0pht to dinner at a Las Vegas hacker convention last year. They have | |
| worked with the L0pht to plug subsequent security loopholes while | |
| simultaneously adding hacker-style techniques to in-house testing. | |
| [snip...] | |
| In doing so, the L0pht is grabbing the world's attention. But for all | |
| their skill in unscrambling the great riddles of technology, they remain | |
| baffled by some fundamental mysteries of life. Asked what puzzle they | |
| would most like to solve, "Kingpin" replied: "Girls." | |
| [See! At least 2 out of 7 l0pht members hack for girls!] | |
| 0x12>------------------------------------------------------------------------ | |
| Title: 101 Ways to Hack into Windows NT | |
| Source: Surveillance List Forum | |
| Date: April 3, 1998 | |
| MELBOURNE, AUSTRALIA: A study by Shake Communications Pty Ltd has | |
| identified not 101, but 104, vulnerabilities in Microsoft Windows NT, | |
| which hackers can use to penetrate an organisation's network. | |
| Many of the holes are very serious, allowing intruders privileged access | |
| into an organisation's information system and giving them the ability to | |
| cause critical damage - such as copying, changing and deleting files, and | |
| crashing the network. Most of the holes apply to all versions (3.5, 3.51 | |
| and 4) of the popular operating system. | |
| [snip...] | |
| Shake Communications also provides links to patches/fixes in its | |
| Vulnerabilities Database, which also covers other operating systems, | |
| programs, applications, languages and hardware. | |
| [snip...] | |
| 0x13>------------------------------------------------------------------------ | |
| Title: Suspected NASA Hacker Nabbed | |
| Source: CNET news.com | |
| Date: April 6, 1998 | |
| TORONTO, Ontario--A 22-year-old Canadian man suspected of breaking into a | |
| NASA Web site and causing tens of thousands of dollars in damage has been | |
| arrested by Canadian Mounties. | |
| The Royal Canadian Mounted Police in the northern Ontario city of Sudbury | |
| charged Jason Mewhiney with mischief, illegal entry, and willfully | |
| obstructing, interrupting, and interfering with the lawful use of data, | |
| Corporal Alain Charbot said today. | |
| [u4ea?!] | |
| [snip...] | |
| More than $70,000 worth of damage was caused at the NASA Web site and | |
| officials were forced to rebuild the site and change security, Charbot | |
| said. | |
| The FBI tracked the hacker by tracing telephone numbers to the Sudbury | |
| area. | |
| The Mounties raided the homes of Mewhiney's divorced parents and seized an | |
| ancient computer, a second basic computer, a high-speed modem, diskettes, | |
| and documents. | |
| [snip...] | |
| Charbot said ironically, once hackers are released from police custody | |
| they are prime candidates for cushy corporate jobs, doing the same type of | |
| work--but with the permission of Web site builders. | |
| [Why must these people revert to the use of 'web' terms?!] | |
| 0x14>------------------------------------------------------------------------ | |
| Title: CEOs Hear the Unpleasant Truth about Computer Security | |
| Source: CNN | |
| Author: Ann Kellan | |
| Date: April 6, 1998 | |
| ATLANTA (CNN) -- Computer hackers breaking into government and corporate | |
| computers is estimated to be a $10 billion-a-year problem, so CEOs met | |
| Monday in Atlanta to hear what government and industry experts are doing | |
| about it. | |
| [More expert figures on damage... <sigh>] | |
| They learned, among other things, that the Pentagon alone had 250,000 | |
| hacker attempts on its computer system last year, and that computer | |
| networks are easy targets. | |
| [And more quoting of inaccurate statistics...] | |
| They also learned that there are almost 2,000 Web sites offering tips, | |
| tools and techniques to hackers. | |
| Among the things a hacker can do is send an e-mail to someone and attach a | |
| computer program to it. The attached program will, in the words of one | |
| hacker, "open up a back door" into the computer system it was sent to. | |
| [Its just that easy I bet...] | |
| [snip...] | |
| According to IBM CEO Louis Gerstner, government and corporations need to | |
| work together to set standards for security practices such as | |
| hacker-resistant encryption codes. | |
| "We should be encouraging the widespread adoption of encryption technology | |
| right now, led by U.S.-based manufacturers," Gerstner said. | |
| CIA Director George Tenet told the CEOs not to look to the government to | |
| fix the problem. | |
| [Now there is a good quote.] | |
| [snip...] | |
| 0x15>------------------------------------------------------------------------ | |
| Title: Codebreakers | |
| Source: Time Magazine | |
| Date: April 20, 1998 | |
| CRACKED Thought your new digital cell phone was safe from high-tech | |
| thieves? Guess again. Silicon Valley cypherpunks have broken the | |
| proprietary encryption technology used in 80 million GSM (Global System | |
| for Mobile communications) phones nationwide, including Motorola MicroTAC, | |
| Ericsson GSM 900 and Siemens D1900 models. Now crooks scanning the | |
| airwaves can remotely tap into a call and duplicate the owner's digital | |
| ID. "We can clone the phones," brags Marc Briceno, who organized the | |
| cracking. His advice: manufacturers should stick to publicly vetted codes | |
| that a bunch of geeks can't crack in their spare time. --By Declan | |
| McCullagh/Washington | |
| 0x16>------------------------------------------------------------------------ | |
| Title: Hackers Could Disable Military | |
| Source: Washington Times | |
| Author: Bill Gertz | |
| Date: April 16, 1998 | |
| Senior Pentagon leaders were stunned by a military exercise showing how | |
| easy it is for hackers to cripple U.S. military and civilian computer | |
| networks, according to new details of the secret exercise. | |
| Using software obtained easily from hacker sites on the Internet, a group | |
| of National Security Agency officials could have shut down the U.S. | |
| electric-power grid within days and rendered impotent the | |
| command-and-control elements of the U.S. Pacific Command, said officials | |
| familiar with the war game, known as Eligible Receiver. | |
| [snip...] | |
| Pentagon spokesman Kenneth Bacon said, "Eligible Receiver was an important | |
| and revealing exercise that taught us that we must be better organized to | |
| deal with potential attacks against our computer systems and information | |
| infrastructure." | |
| [Such a neat name too!] | |
| The secret exercise began last June after months of preparation by the NSA | |
| computer specialists who, without warning, targeted computers used by U.S. | |
| military forces in the Pacific and in the United States. | |
| The game was simple: Conduct information warfare attacks, or "infowar," on | |
| the Pacific Command and ultimately force the United States to soften its | |
| policies toward the crumbling communist regime in Pyongyang. The "hackers" | |
| posed as paid surrogates for North Korea. | |
| The NSA "Red Team" of make-believe hackers showed how easy it is for | |
| foreign nations to wreak electronic havoc using computers, modems and | |
| software technology widely available on the darker regions of the | |
| Internet: network-scanning software, intrusion tools and password-breaking | |
| "log-in scripts." | |
| [They successfully hack their target, yet they are "make-believe"?] | |
| According to U.S. officials who took part in the exercise, within days the | |
| team of 50 to 75 NSA officials had inflicted crippling damage. | |
| They broke into computer networks and gained access to the systems that | |
| control the electrical power grid for the entire country. If they had | |
| wanted to, the hackers could have disabled the grid, leaving the United | |
| States in the dark. | |
| [snip...] | |
| The attackers also foiled virtually all efforts to trace them. FBI agents | |
| joined the Pentagon in trying to find the hackers, but for the most part | |
| they failed. Only one of the several NSA groups, a unit based in the | |
| United States, was uncovered. The rest operated without being located or | |
| identified. | |
| The attackers breached the Pentagon's unclassified global computer network | |
| using Internet service providers and dial-in connections that allowed them | |
| to hop around the world. | |
| [snip...] | |
| The targets of the network attacks also made it easy. "They just were not | |
| security-aware," said the official. | |
| A second official found that many military computers used the word | |
| "password" for their confidential access word. | |
| [*scribbling notes..*] | |
| 0x17>------------------------------------------------------------------------ | |
| Title: Secret Service Hackers Can't Crack Internet | |
| Source: PA News | |
| Author: Giles Turnbull | |
| Date: April 21, 1998 | |
| [So the NSA has better hackers than the Secret Service. <snicker>] | |
| Professional computer hackers from the secret services were brought in | |
| to attempt to hack into the Government's internal secure communications | |
| system, which was launched today. | |
| As part of the year-long planning and preparation of the Intranet, staff | |
| from GCHQ and similar security organisations were brought in to try to hack | |
| into the system. | |
| But they failed. | |
| [snip...] | |
| 0x18>------------------------------------------------------------------------ | |
| Title: Now Hiring: Hackers (Tattoos Welcome) | |
| Source: Tribune | |
| Author: Susan Moran | |
| Date: April 12, 1998 | |
| Even the computer professionals who like to wear Birkenstocks and T-shirts | |
| to work find the dress code of GenX hackers a bit extreme. The main | |
| elements seem to be tattoos and nose rings. | |
| [No stereotyping here...] | |
| They'd better get used to them. Many computer hackers, some of them | |
| recovering computer criminals, are adeptly turning their coveted expertise | |
| into big bucks. | |
| A surge in computer crime, spurred by the shift to networked computers and | |
| by the growing popularity of the Internet, has created a huge demand for | |
| information security experts who can help protect companies' computer | |
| systems. Recent high-profile attacks on government and university computer | |
| networks highlighted the vulnerability of these networks and spurred | |
| corporate executives to seek ways to fortify their systems. | |
| [snip...] | |
| In a separate recent incident, the Justice Department last month arrested | |
| three Israeli teenagers suspected of masterminding the break-ins of | |
| hundreds of military, government and university computer sites to gaze at | |
| unclassified information. The Federal Bureau of Investigation is also | |
| investigating two California teens who linked up with their Israeli | |
| co-conspirators over the Internet. | |
| [Three Israeli teens? Gee, could they mean the two Cloverdale CALIFORNIA | |
| kiddies and 'the analyzer'?] | |
| [snip...] | |
| Hackers' anarchistic style is gradually gaining acceptance in corporations | |
| and government agencies, although some conservative organizations feel | |
| safer renting experts from established consulting firms. | |
| [Experts that consist of hackers who can dress well, and act all | |
| 'corporate'.] | |
| [snip...] | |
| That yellow-haired hacker, a 24-year-old who prefers to be known by his | |
| alias, "Route," also sports a tongue bar. His work as an information | |
| security consultant is worth $1,500 to $2,000 a day to clients who want to | |
| arm themselves against attacks by "crackers"--the correct term for hackers | |
| who use their computer expertise to commit malicious acts of infiltrating | |
| computer networks. On his own time, Route edits Phrack, a computer | |
| security journal (phrack.com). And he occasionally gives talks to | |
| government and corporate clients for Villella's firm, New Dimensions | |
| International (www.ndi.com). Route writes his own security-related tools | |
| and claims he's never used them for illegal snooping. | |
| [Woohoo! Go Route! Go Route!] | |
| [snip...] | |
| Another hacker who now makes a healthy living consulting goes by the alias | |
| "Mudge." He is a member of L0pht, a sort of "hacker think tank" consisting | |
| of a handful of Boston-based hackers who work out of a loft space, where | |
| they research and develop products and swap information about computer and | |
| cellular phone security, among other things. Mudge consults for private | |
| and public organizations, teaches classes on secure coding practices, and | |
| writes his own and reviews others' code. "It pays well, but the money | |
| isn't the main reason I'm doing it," he said. | |
| [In a recent talk over beer, Mudge confided in me that he does it | |
| for the girls. :) ] | |
| What he likes best is knowing he's among the elite experts who understand | |
| computer security more than big-name consultants. He's proud that he and | |
| his ragged assortment of hacker friends are called in to solve problems | |
| that stump the buttoned-down set. | |
| "Not bad for a bunch of bit-twiddlers," he wrote in an e-mail missive. | |
| 0x19>------------------------------------------------------------------------ | |
| Title: Hacker Stoppers? | |
| Source: InformationWeek | |
| Author: Deborah Kerr | |
| Date: April 27 | |
| Companies bought $65 million worth of network-intrusion | |
| tools last year, but capabilities still lag behind what's promised. | |
| Neal Clift no longer sleeps on the floor of his office. Ten years ago, he | |
| slept under his Digital VAX at Leeds University in England, listening for | |
| the telltale clicks and hums that signal an intruder on his network. For | |
| weeks, a hacker had been shamelessly crashing his machine, deleting files, | |
| and reconfiguring controls. Clift tracked the hacker's movements, recorded | |
| the keystrokes, and eventually closed up the hacker's entry points. | |
| At the time, pulling late-nighters was the only way to catch a hacker, | |
| since poring over system logs could only establish the hacker's patterns | |
| after the fact. Now, intrusion-detection technology lets network security | |
| managers and administrators catch trespassers without spending the night | |
| on the office floor. | |
| Intrusion-detection tools are a $65 million industry that will grow as | |
| large as the firewall market, which reached about $255 million in 1997, | |
| according to the Hurwitz Group, in Framingham, Mass. Touted as network | |
| burglar alarms, intrusion-detection systems are programmed to watch for | |
| predefineds2000] attack "signatures," or predefined bytecode trails of | |
| prespecified hacks. Intrusion-detection systems also send out real-time | |
| alerts of suspicious goings-on inside the network. enger] | |
| But don't bet the server farm on intrusion-detection systems yet. They're | |
| still new, and their capabilities are limited. No matter what you buy, | |
| some portion of the enterprise will be unprotected. Intrusion-detection | |
| systems also can break down under certain types of attacks, in some cases | |
| even turning on their own networks under the guidance of a truly | |
| knowledgeable hacker. | |
| "There's no one tool to solve all the security problems throughout your | |
| network," says Jim Patterson, vice president of security and | |
| telecommunications at Oppenheimer Funds, in Denver... | |
| [snip...] | |
| 0x1a>------------------------------------------------------------------------ | |
| Title: Hackers' Dark Side Gets Even Darker | |
| Author: Douglas Hayward | |
| LONDON -- The hacker community is splitting into a series of distinct | |
| cultural groups -- some of which are becoming dangerous to businesses and | |
| a potential threat to national security, an official of Europe's largest | |
| defense research agency warned Thursday. New types of malicious hackers | |
| are evolving who use other hackers to do their dirty work, said Alan Hood, | |
| a research scientist in the information warfare unit of Britain's Defense | |
| Evaluation and Research Agency (DERA). | |
| Two of the most dangerous types of malicious hackers are information | |
| brokers and meta-hackers, said Hood, whose agency develops security | |
| systems for the British military. Information brokers commission and pay | |
| hackers to steal information, then resell the information to foreign | |
| governments or business rivals of the target organizations. | |
| Meta-hackers are sophisticated hackers who monitor other hackers without | |
| being noticed, and then exploit the vulnerabilities identified by these | |
| hackers they are monitoring. A sophisticate meta-hacker effectively uses | |
| other hackers as tools to attack networks. "Meta-hackers are one of the | |
| most sinister things I have run into," Hood said. "They scare the hell out | |
| of me." | |
| [Great.. more terms and lousy journalism..] | |
| DERA is also concerned that terrorist and criminal gangs are preparing to | |
| use hacking techniques to neutralize military, police and security | |
| services, Hood said. | |
| [Criminal gangs.. oooh...] | |
| [snip... lame stereotype crap] | |
| 0x1b>------------------------------------------------------------------------ | |
| Title: Japan Fears It's Becoming a Base for Hackers | |
| Source: Daily Yomiuri On-Line | |
| Author: Douglas Hayward | |
| Date: 4/29/98 | |
| To fill in legal loopholes that have caused an increase in unauthorized | |
| computer access, the National Police Agency has set up a group of experts | |
| to study how to prevent Internet crimes. | |
| Unlike Europe and the United States, Japan has no law prohibiting | |
| unauthorized access to computers through the Internet. There has been a | |
| stream of reports of anonymous hackers accessing corporate servers. | |
| [Gee, they have no laws making hacking illegal, and they wonder why | |
| they are becoming a base for hackers? Bright.] | |
| [snip...] | |
| The Japan Computer Emergency Response Team Coordination Center has been | |
| studying cases of unauthorized access through the Net, and found a total | |
| of 644 from the time of the center's establishment in October 1996 to last | |
| month. | |
| Meanwhile, police uncovered 101 high-tech crimes in 1997, three times as | |
| many as in the previous year. | |
| 0x1c>------------------------------------------------------------------------ | |
| Title: Kevin Mitnick Hacker Case Drags On and On | |
| Source: ZDTV | |
| Author: Kevin Poulsen | |
| Date: 4/28/98 | |
| [If you haven't visited, go to www.kevinmitnick.com right now.] | |
| LOS ANGELES-- "Now, have we made any progress here?" | |
| With those words, Judge Mariana Pfaelzer opened the latest hearing in the | |
| Kevin Mitnick case in L.A.'s U.S. District Court Monday. She might as well | |
| have said, "Let's get ready to rumble." | |
| It's now been more than three years since a dramatic electronic manhunt | |
| ended with Mitnick's arrest, national headlines, books and movie deals. | |
| Since then, the excitement has faded. The books oversaturated the market; | |
| the movies never got made. And the once fast-paced story of a compulsive | |
| hacker with a goofy sense of humor is mired in its epilogue: the slow ride | |
| to disposition over the speed-bumps of the federal justice system. | |
| [snip...] | |
| But only some of it. The government wants to keep a tight lid on the | |
| "proprietary" software in the case, and on what it calls "hacker tools." | |
| The defense can review these files, but they can't have their own copies | |
| for analysis. | |
| [snip...] | |
| If the evidence was in paper form, the government would have probably | |
| agreed. But Painter says that with electronic evidence, "it's too easy for | |
| this to be disseminated by the defendants." | |
| In other words, the government doesn't want the data to show up on a Web | |
| site in Antigua. | |
| [snip...] | |
| 0x1d>------------------------------------------------------------------------ | |
| Title: Millions Lost to Phone Hackers | |
| Author: Andrew Probyn | |
| MILLIONS of dollars are being ripped off phone users in Australia by | |
| hackers using increasingly elaborate phone scams. Households, businesses | |
| and mobile phone users have become victims of widespread and systematic | |
| phone fraud. | |
| [Hackers using phone scams?] | |
| As carriers Telstra and Optus make advances in protecting their | |
| telecommunications networks, hackers are increasingly adept at breaking | |
| their security codes to rip off users. | |
| The Herald Sun has discovered many cases of billing discrepancies blamed | |
| on hackers, including one householder charged $10,000 for calls he said he | |
| never made. | |
| A Herald Sun investigation has also shown: SEX calls to chat lines in the | |
| United States, Guyana, the Dominican Republic, Russia, Chile and the | |
| Seychelles are commonly charged to other people's accounts. HACKERS can | |
| divert their Internet, local and international call costs without | |
| detection. | |
| [Why do I think they are using 'hackers' for any sex-fiend that stole | |
| a code?] | |
| [snip...] | |
| "Hacking could be costing consumers in the region of millions of dollars," | |
| he said. "Some of these calls are very expensive - sex calls, for example, | |
| can be up to $30 just to be connected." | |
| [snip...] | |
| 0x1e>------------------------------------------------------------------------ | |
| Title: Hackers on the Hill | |
| Author: Annaliza Savage | |
| [FINALLY...get some incredible hackers up there to school these | |
| weenies. Go l0pht!] | |
| Seven hackers will face the Senate Government Affairs Committee Tuesday. | |
| But they aren't in any trouble. | |
| The seven hackers have been invited by Senator Fred Thompson (R-Tenn.)-- | |
| the sometime-actor you may remember from such films as The Hunt For Red | |
| October and Die Hard 2-- to testify about the state of the US Government's | |
| computer networks. | |
| The seven-- Mudge, King Pin, Brian Oblivian, Space Rouge, Weld Pond, Tan | |
| and Stefan-- are all members of the L0pht, a hacker hangout in Boston, and | |
| have been part of the hacker underground for years. | |
| "We were surprised to get an email from a senator's aide. We have had some | |
| contacts with law enforcement over the years, but this was something | |
| completely different," said Weld Pond. | |
| [snip...] | |
| "We are trying to return the label hacker to the badge of honor it used to | |
| be in the old days. A word that means knowledge and skill, not criminal or | |
| script-kiddies, as it does in the popular press today," Weld Pond said. | |
| [snip...] | |
| When Thompson's aide, John Pede, showed up at the L0pht to discuss the | |
| Senate hearings with the group, the irony of the visit wasn't wasted on | |
| hackers. Weld Pond explained: "We thought about blindfolding him on the | |
| way over here but decided against it in the end. The visit was a little | |
| uncomfortable. When the FBI has reporters visit them they clean up quite a | |
| bit and keep an eagle eye on the visitors. This was no different except | |
| the tables were turned." | |
| Mudge was glad to be able to show off the l0pht to the men in suits. "We | |
| actually enjoyed having the government officials over. It's a wonderful | |
| sight when we bring guests over to the l0pht and their jaws drop on the | |
| floor after seeing all of the stuff we have managed to engineer and get | |
| working. Especially when they realize it has all been without any formal | |
| funding." | |
| [snip...] | |
| 0x1f>------------------------------------------------------------------------ | |
| Title: RSA Sues Network Associates | |
| Source: CNET NEWS.COM | |
| Author: Tim Clark | |
| Date: 5.20.98 | |
| RSA Data Security is seeking to bar Network Associates from shipping any | |
| Trusted Information Systems software that uses RSA encryption technology. | |
| [Nyah nyah!] | |
| Earlier this year, Network Associates acquired TIS, licensed by RSA to use | |
| its encryption algorithms in TIS virtual private network software. RSA is | |
| a wholly owned subsidiary of Security Dynamics. | |
| [snip...] | |
| "RSA is a company based on intellectual property," said Paul Livesay, | |
| RSA's general counsel. "Right now we perceive Network Associates as having | |
| an approach to doing business by acquiring companies and ignoring | |
| third-party agreements, so why would we want to assign the license to TIS | |
| to a party that operates in that manner?" | |
| 0x20>------------------------------------------------------------------------ | |
| Title: Clinton to Outline Cyberthreat Policy | |
| Source: CNET NEWS.COM | |
| Author: Tim Clark | |
| Date: 5.21.98 | |
| In a commencement speech at the U.S. Naval Academy tomorrow, President | |
| Clinton is expected to highlight cyberthreats to the nation's electronic | |
| infrastructure, both from deliberate sabotage and from accidents such as | |
| the satellite outage that silenced pagers across the nation this week. | |
| Clinton also is expected to outline two new security directives, one aimed | |
| at traditional terrorism and the other at cyberthreats. The cyberthreats | |
| directive follows last year's report from the Presidential Commission on | |
| Critical Infrastructure Protection. | |
| [snip...] | |
| "Clinton will announce a new policy for cyberterrorism based on the | |
| recommendations of the commission, stressing the fact that we need | |
| private-sector help to solve this problem, since the private sector owns | |
| 80 to 90 percent of the nation's infrastructure," said P. Dennis LeNard | |
| Jr., deputy public affairs officer at PCCIP. Under the new policy, that | |
| agency will become the Critical Infrastructure Assurance Office, or CIAO. | |
| Clinton also is expected to order federal agencies to come up with a plan | |
| within three to five years that identifies vulnerabilities of the nation's | |
| infrastructure and responses to attacks as well as creating a plan to | |
| reconstitute the U.S. defense system and economy if a cyberattack | |
| succeeds, said a former White House staffer familiar with Clinton's | |
| speech. | |
| [Three to five years.. how.. timely.] | |
| [snip...] | |
| "The Department of Justice is not keen on sharing information that could | |
| lead to criminal prosecutions," the official said. "The private sector | |
| does not trust the FBI, and the FBI doesn't want to give out secrets. | |
| They're afraid that if they share information, they may someday have to | |
| testify in court." | |
| 0x21>------------------------------------------------------------------------ | |
| Title: Programmer Sentenced for Military Computer Intrusion | |
| Source: CNN | |
| Date: 5.25.98 | |
| DAYTON, Ohio (AP)- A computer programmer was sentenced to six months at a | |
| halfway house for gaining access to a military computer that tracks Air | |
| Force aircraft and missile systems. | |
| Steven Liu, 24, was also fined $5,000 Friday after pleading guilty to | |
| exceeding authorized access to a computer. | |
| Liu, a Chinese national who worked for a military contractor in Dayton, | |
| downloaded passwords from a $148 million database at Wright-Patterson Air | |
| Force Base. He said he accidentally discovered the password file and used | |
| it to try to find his job-performance evaluation. | |
| [snip...] | |
| 0x22>------------------------------------------------------------------------ | |
| Title: Editorial - Hacker vs Cracker, Revisited | |
| Source: OTC: Chicago, Illinois | |
| Author: Bob Woods | |
| Date: 5.22.98 | |
| Newsbytes. If a person talks about or writes a news story regarding a | |
| hacker, one creates an image that is perpetuated in a Network Associates | |
| TV ad: the heavily tattooed, ratty looking cyberpunk who breaks into | |
| systems and posts proprietary information on the Internet for the same | |
| reason "why (I) pierce (my) tongue." The big problem, though, is that | |
| person is more accurately described as a "cracker," not a "hacker." | |
| ZDTV CyberCrime correspondent Alex Wellen said earlier this week that | |
| "cracker" is gaining acceptance in the media -- and quoted an old column | |
| of mine in the process. Because of this unexpected exposure, I decided to | |
| take a second look at my old work. | |
| First, here's the text of my January 23, 1996 column: | |
| Our readers have their hackles up when hacker is mentioned in our | |
| stories. "Hackers," they argue, are good people who just want to learn | |
| everything about a computer system, while "crackers" are the ones who are | |
| breaking into computer systems illegally. | |
| The problem arises when the public and people who shape society get a | |
| hold of terms like "hacker" -- a word once viewed as non-threatening, but | |
| is now turned into a name that conjures up visions of altered World Wide | |
| Web pages and crashed computer systems. | |
| "Que's Computer and Internet Dictionary, 6th Edition," by Dr. Bryan | |
| Pfaffenberger with David Wall, defines a hacker as "A computer enthusiast | |
| who enjoys learning everything about a computer system and, through clever | |
| programming, pushing the system to its highest possible level of | |
| performance." But during the 1980s, "the press redefined the term to | |
| include hobbyists who break into secured computer systems," Pfaffenberger | |
| wrote. | |
| At one time hackers -- the "good" kind -- abided by the "hacker ethic," | |
| which said "all technical information should, in principle, be freely | |
| available to all. Therefore gaining entry to a system to explore data and | |
| increase knowledge is never unethical," according to the Que dictionary. | |
| These ethics applied to the first-generation hacker community, which | |
| Que said existed from roughly 1965 to 1982. While some of those people do | |
| still exist, many other people who describe themselves as "hackers" are a | |
| part of the current generation of people who "destroy, alter, or move data | |
| in such a way that could cause injury or expense" -- actions that are | |
| against the hacker ethic, Que's dictionary said. Many of those actions are | |
| also against the law. | |
| Today's hacker generation -- the ones bent on destruction -- are more | |
| accurately called "crackers." Que defines such a person as "A computer | |
| hobbyist who gets kicks from gaining unauthorized access to computer | |
| systems. Cracking is a silly, egotistical game in which the object is to | |
| defeat even the most secure computer systems. Although many crackers do | |
| little more than leave a 'calling card' to prove their victory, some | |
| attempt to steal credit card information or destroy data. Whether or not | |
| they commit a crime, all crackers injure legitimate computer users by | |
| consuming the time of system administrators and making computer resources | |
| more difficult to access." | |
| Here's the rub: whenever the media, including Newsbytes, uses the term | |
| "hacker," we are hit with complaints about the term's usage. E-mails to | |
| us usually say "I'm a hacker, yet I don't destroy anything." In other | |
| words, the people who write us and other media outlets are a part of the | |
| first generation of hackers. | |
| But the media reflects society as much as, if not more than, they | |
| change or alter it. Today's culture thinks of hackers as people who | |
| destroy or damage computer systems, or ones who "hack into" computers to | |
| obtain information normal people cannot access. While it's probably the | |
| media's fault, there's no going back now -- hackers are now the same | |
| people as crackers. | |
| Besides, if a person outside of the computer biz called someone a | |
| cracker, images of Saltines or a crazy person or an investigator in a | |
| popular British television series would probably come to mind. For most | |
| people on the street, the last thing they would think of is a person they | |
| know as a hacker. | |
| So, what's to be done about the situation? Not a whole heck of a lot, | |
| unfortunately. The damage is done. If more people in the "general public" | |
| and the "mainstream media" read this news service and saw this article, | |
| some headway might be made. But even if they did, cultural attitudes and | |
| thoughts are very difficult to change. For those people in the US -- | |
| remember New Coke? Or the metric system? If you're outside the US, can you | |
| imagine calling football "soccer?" | |
| And to the first generation of hackers -- those of us "in the know" in | |
| this industry do know about you. When we report on hackers nowadays, we're | |
| not talking about you, and we do not mean to insult you. Honest. | |
| === Today's Opinion | |
| Okay, so that last paragraph was a bit on the hokey side. Alright, so | |
| it was really hokey. But from what I remember, we had been getting quite a | |
| few angry e-mails at the time regarding our usage of "hacker," and I was | |
| trying to do a bit of damage control. But if memory serves me correctly, | |
| we received a couple of "nice try" letters after we published the | |
| editorial. Nice try? Well, I thought it was. | |
| But, was it a "safe" editorial? Sure. But it was -- and still is -- | |
| also "safe" to just write about "hackers" and offend a few people, rather | |
| than use the term "cracker" and leave a bunch of people scratching their | |
| heads over what the heck a "cracker" even was. | |
| While I'm seeing "cracker" more and more in computer-related | |
| publications (unfortunately, though, not in ours as much as I'd like to | |
| see) these days, the term is sorely lacking in the widely | |
| read/viewed/listened-to media outlets. | |
| I'll take the liberty of quoting what ZDTV's Wellen quoted me as saying | |
| two years ago: "If more people in the 'general public' and the 'mainstream | |
| media' read this news service and saw this article, some headway might be | |
| made (in accurately calling people crackers instead of hackers)." | |
| Now, I can see a mainstream media-type -- I used to be one of these | |
| people, by the way -- wondering how in the heck can they get their average | |
| seventh-grade audience to understand that a cracker is different from a | |
| hacker. It's easy for us computer/IT journalist types to write to our | |
| expectations of our audience, because it is generally pretty much like us. | |
| The answer, though, is pretty easy. Here's an example: | |
| "Two teenage hackers, more accurately known as 'crackers,' illegally | |
| entered into the Pentagon's computer system and took it out in an | |
| overnight attack." The real trick, then, is to never again use "hacker" | |
| in the story. Just use "cracker." Your audience will pick up on this, | |
| especially if you do it in all of your stories. I promise. | |
| So there. My unwieldy media consulting bill is now in the mail to all | |
| of the non-computing local and national media outlets. | |
| 0x23>------------------------------------------------------------------------ | |
| Title: Windows NT Security Under Fire | |
| Author: Chris Oakes | |
| Date: 6.1.98 | |
| Listen to security expert and consultant Bruce Schneier and he'll tell you | |
| that Windows NT's security mechanism for running virtual private networks | |
| is so weak as to be unusable. Microsoft counters that the issues Schneier | |
| points out have mostly been addressed by software updates or are too | |
| theoretical to be of major concern. | |
| Schneier, who runs a security consulting firm in Minneapolis, says his | |
| in-depth "cryptanalysis" of Microsoft's implementation of the | |
| Point-to-Point Tunneling Protocol (PPTP) reveals fundamentally flawed | |
| security techniques that dramatically compromise the security of company | |
| information. | |
| "PPTP is a generic protocol that will support any encryption. We broke the | |
| Microsoft-defined [encryption] algorithms, and also the Microsoft control | |
| channel." However, he said he was unaware of some of Microsoft's NT 4.0 | |
| updates when he ran his tests. | |
| With relative ease, intruders can exploit the flaws, Schneier said, which | |
| he summarizes as weak authentication and poor encryption implementation. | |
| The result is that passwords can be easily compromised, private | |
| information can be disclosed, and servers used to host a virtual private | |
| network, or VPN, can be disabled through denial-of-service attacks, | |
| Schneier said. | |
| It's kindergarten cryptography. These are dumb mistakes," Schneier said. | |
| In letting companies use the public Internet as a means for establishing | |
| "private" company networks, VPN products use the protocol to establish the | |
| "virtual" connections between remote computers. | |
| PPTP secures the packets sent via the Internet by encapsulating them in | |
| other packets. Encryption is used to further secure the data contained in | |
| the packets. It is the scheme Microsoft uses for this encryption that | |
| Schneier says is flawed. | |
| Specifically, Schneier's analysis found flaws that would let an attacker | |
| "sniff" passwords as they travel across a network, break open an | |
| encryption scheme, and mount denial-of-service attacks on network servers, | |
| which render them inoperable. Confidential data is therefore compromised, | |
| he said. | |
| The nature of the flaws varied, but Schneier identified five primary ones. | |
| For example, Schneier found a method of scrambling passwords into a code | |
| -- a rough description of "hashing" -- to be simple enough that the code | |
| is easily broken. Though 128-bit "keys" can be used to access the | |
| encryption feature of the software, Schneier said the simple | |
| password-based keys that it allows can be so short that information could | |
| be decrypted by figuring out what may be very simple passwords, such as a | |
| person's middle name. | |
| "This is really surprising. Microsoft has good cryptographers in their | |
| employ." The problem, he said, is that they're not adequately involved in | |
| product development. | |
| Schneier emphasized that no flaws were found in the PPTP protocol itself, | |
| but in the Windows NT version of it. Alternate versions are used on other | |
| systems such as Linux-based servers. | |
| Microsoft's implementation is "only buzzword-compliant," Schneier said. | |
| "It doesn't use [important security features like 128-bit encryption] | |
| well." | |
| Windows NT has in the past been the object of several security complaints, | |
| including denial-of-service vulnerabilities. | |
| Microsoft says the five primary weaknesses Schneier has called attention | |
| to are either theoretical in nature, previously discovered, and/or have | |
| been addressed by recent updates to the operating system software. | |
| "There's really not much in the way of news here," said Kevin Kean, an NT | |
| product manager at Microsoft. "People point out security issues with the | |
| product all the time. | |
| "We're on our way to enhancing our product to take care of some of these | |
| situations already," Kean said. | |
| He acknowledged that the password hashing had been fairly simple, but that | |
| updates have used a more secure hashing algorithm. He also contends that | |
| even a weak hashing can be relatively secure. | |
| The issue of using simple passwords as encryption keys is relevant to | |
| individual company policy more than Microsoft's product. A company that | |
| has a policy requiring employees to use long, more complex passwords can | |
| ensure that their network encryption is more secure. An update to the | |
| product, Kean said, lets administrators require a long password from | |
| company employees. | |
| On another issue, where a "rogue" server could fool a virtual private | |
| network into thinking it was a legitimate node on the network, Karan | |
| Khanna, a Windows NT product manager, said while that was possible, the | |
| server would only intercept of a "stream of gobbledygook" unless the | |
| attacker had also cracked the encryption scheme. That and other issues | |
| require a fairly difficult set of conditions, including the ability to | |
| collect the diverging paths of VPN packets onto a server, to come into | |
| place. | |
| For that reason, Microsoft insists its product offers a reasonable level | |
| of security for virtual private networks, and that upcoming versions of | |
| the software will make it stronger. | |
| Windows NT security expert Russ Cooper, who runs a mailing list that | |
| monitors problems with Windows NT, agrees with Microsoft that most of | |
| Schneier's findings have been previously turned up and discussed in forums | |
| like his. What Schneier has done is tested some of them, he said, and | |
| proven their existence. | |
| But he points out that fixes for the problems have only recently been | |
| released, outdating Schneier's tests. The problems may not have been all | |
| successfully addressed by the fixes, Cooper said, but represent an unknown | |
| that may negate some of Schneier's findings. | |
| On Schneier's side, however, Cooper agrees that it typically takes | |
| publicity of such weaknesses to get Microsoft to release fixes. "Folks | |
| need to get better response from Microsoft in terms of security," Cooper | |
| said. | |
| He also added support to a point that Schneier makes -- that Microsoft | |
| treats security more casually than other issues because it has no impact | |
| on profit. | |
| "Microsoft doesn't care about security because I don't believe they think | |
| it affects their profit. And honestly, it probably doesn't." Cooper | |
| believes this is part of what keeps them from hiring enough security | |
| personnel. | |
| Microsoft vehemently contests the charge. Microsoft's Khanna said in | |
| preparing the next release of the operating system, the company has | |
| installed a team to attack NT, an effort meant to find security problems | |
| before the product is released. | |
| And, Microsoft reminds us, no product is totally secure. "Security is a | |
| continuum," Microsoft's Kean said. "You can go from totally insecure to | |
| what the CIA might consider secure." The security issue at hand, he said, | |
| lies within a reasonable point on that continuum. | |
| 0x24>------------------------------------------------------------------------ | |
| Title: New Decoy Technology Designed to Sting Hackers | |
| Source: ZDNet | |
| Author: Mel Duvall | |
| There was a sweet bonus for Network Associates Inc. in its recent | |
| acquisition of intrusion detection company Secure Networks Inc. The | |
| security vendor gained access to a new technology that is designed to | |
| sting hackers, not just keep them out. | |
| Secure Networks is developing a product, code-named Honey Pot, that is | |
| essentially a decoy network within a network. The idea is to lure hackers | |
| into the decoy, like flies to a honey pot, to gain as much information | |
| about their hacking techniques and identity as possible. | |
| "It's a virtual network in every way, with one exception - it doesn't | |
| exist," Secure Networks President Arthur Wong said. | |
| The product is unusual in that it acknowledges a fact of life few | |
| companies are willing to admit - that hackers can and do break into | |
| corporate networks. | |
| Tom Claire, director of product management at Network Associates, said | |
| after years of denying the problem exists, companies are beginning to take | |
| intrusion detection seriously. | |
| "Now they're starting to say, maybe I can watch what hackers are doing in | |
| my network and find out what they're after and how they do it," he said. | |
| "Then they can use that knowledge to make their systems better." | |
| The seriousness of the issue was underscored last week with reports that | |
| America Online Inc. was suffering from a series of attacks during which | |
| hackers gained access to subscriber and AOL staff accounts. The intruders | |
| appeared to gain access by tricking AOL customer service representatives | |
| into resetting passwords, based on information they obtained by looking at | |
| member profiles. | |
| Honey Pot, which is due to be released in the fourth quarter, draws | |
| hackers in by appearing to offer access to sensitive data. | |
| Once into the dummy network, hackers spend their time trolling through | |
| fake files, while the software gains information about their habits and | |
| tries to trace their source. | |
| Wong said it's unlikely a hacker's identity can be obtained after one | |
| visit to the Honey Pot, but once a hacker breaks into a system, he or she | |
| tends to come back for more. | |
| "It's like tracing a phone call - the more they return, the more you can | |
| narrow down their identity," Wong said. | |
| Larry Dietz, a security analyst at Zona Research Inc., said another | |
| security company, Secure Computing Corp., built offensive capabilities | |
| into its Sidewinder firewall as early as 1996, but "strike back" | |
| technologies, such as Honey Pot, are still relatively unused in the | |
| corporate market. | |
| "It's a good idea if you have a sophisticated user that knows what to do | |
| with the technology," Dietz said. "But how many companies have the staff | |
| or the expertise to be security cops?" | |
| 0x25>------------------------------------------------------------------------ | |
| Title: Reno dedicates high-tech crime fighting center | |
| Source: Knight Ridder | |
| Author: Clif leblanc | |
| COLUMBIA, S.C. -- With the grandeur of a French royal palace, the nation's | |
| first school for prosecutors was dedicated Monday with a challenge from | |
| U.S. Attorney Janet Reno to fight 21st century electronic crime. | |
| ``When a man can sit in St. Petersburg, Russia, and steal from a New York | |
| bank with wire transfers, you know you've got a problem,'' Reno told a | |
| conference room full of dignitaries at the National Advocacy Center. | |
| She said the high-tech equipment the center on the University of South | |
| Carolina campus offers will allow prosecutors to ``fight those who would | |
| use cyber tools to invade us.'' | |
| An estimated 10,000 federal, state and local prosecutors annually will | |
| learn from the nation's best government lawyers at the $26 million center, | |
| which takes up about 262,000 square feet and has 264 dormitory rooms for | |
| prosecutors in training. Students -- practicing prosecutors from across | |
| the nation -- will be taught to use digital wizardry and conventional | |
| classroom training to win convictions against computer criminals, health | |
| care frauds, employers who discriminate and run-of-the-mill offenders. | |
| The center is a unique facility dreamed up 17 years ago by then-U.S. | |
| Attorney General Griffin Bell so government lawyers at all levels could | |
| learn to prosecute crime better. | |
| Reno, formerly a state prosecutor in Dade County, Fla., said she was | |
| especially happy the center will help state and local prosecuting | |
| attorneys, too. ``I'm a child of the state court system,'' she said. ``It | |
| is my hope that this institution can lead the way in properly defining the | |
| roles of state and local ... law enforcement.'' | |
| About 95 percent of all prosecutions in the nation are by local | |
| prosecuting attorneys, said William L. Murphy, president of the National | |
| District Attorneys Association, who attended Monday's opening. | |
| Reno said she also wants the center to tap into University of South | |
| Carolina faculty to teach prosecutors about office management, budgeting, | |
| alternatives to litigation and even to find better ways for citizens and | |
| police to work together to fight crime. | |
| ``We can all blaze a trail to make government responsible to its people | |
| and still make people accountable,'' Reno said in a 15-minute dedication | |
| speech. | |
| If the center works as she envisions it, federal prosecutors will get | |
| better at trying capital cases, and DNA evidence will reduce the chances | |
| that innocent people will be wrongly convicted, Reno said. | |
| In her third trip to Columbia, Reno joked good reports from students | |
| trained at the center have put a stop to early complaints of ``who wants | |
| to go to Columbia?'' | |
| Reno thanked Sen. Fritz Hollings for pushing the idea of the center. She | |
| recalled that in their first meeting Hollings confronted her with a Forbes | |
| magazine article that reported the Justice Department was too big, ``and | |
| there was this little center he wanted to talk about.'' | |
| USC President John Palms said when Hollings first approached him about | |
| placing the center at the school, Palms' immediate answer was: ``Whatever | |
| it is, yes.'' | |
| But the center has a much bigger role for USC, Palms said. He described | |
| the dedication as, ``an event that's probably as important as anything | |
| that's ever happened at the university.'' | |
| Hollings, who is seeking re-election to a seventh term in the U.S. | |
| Senate, jokingly described the finished facility as, ``a little | |
| Versailles.'' The 1,300-room Palace of Versailles was the opulent home of | |
| the French royal family for more than 100 years. | |
| ``This is the most beautiful building the government has ever built,'' | |
| Hollings said. | |
| ``We've got the best of the best for America's prosecutors,'' Hollings | |
| said. ``Now it's up to us to produce the best.'' [Image] | |
| 0x26>------------------------------------------------------------------------ | |
| Title: Man poses as astronaut steals NASA secrets | |
| Source: Reuters | |
| Date: 6.4.98 | |
| HOUSTON (Reuters) [6.4.98] - A licensed airline pilot posing as an | |
| astronaut bluffed his way into a top-security NASA facility and got secret | |
| information on the space shuttle during an eight-month deception, federal | |
| prosecutors said Wednesday. | |
| Jerry Alan Whittredge, 48, faces up to five years in jail and a $250,000 | |
| fine for misrepresenting himself as a federal employee, the U.S. | |
| Attorney's Office for Southern Texas said. | |
| Whittredge contacted NASA's Marshall Space Center in Huntsville, Alabama, | |
| in November, claiming he had been chosen for a space shuttle mission and | |
| requesting a tour of the facility. | |
| According to an affidavit by NASA special agent Joseph Gutheinz, | |
| Whittredge told NASA officials that he was a CIA agent and held the Medal | |
| of Honor. | |
| On the basis of his false credentials he was granted a tour on Nov. 21 and | |
| 22. | |
| "Mr. Whittredge was permitted to sit at the console of NASA Mission | |
| Control (NASA's most secure area) at Marshall Space Flight Center during a | |
| shuttle mission," the affidavit said. | |
| In March Whittredge tricked NASA into giving him confidential information | |
| about the shuttle's propulsion system and in May he hoodwinked officials | |
| at Kingsville Naval Air Station in Texas into giving him training on a | |
| T-45 flight simulator. | |
| Gutheinz said Whittredge had most recently been living in Texas but did | |
| not appear to be employed there and that he also had a permanent address | |
| in Florida. | |
| Whittredge made an initial appearance in court on Tuesday and is due to | |
| attend a bond hearing on Friday. | |
| 0x27>------------------------------------------------------------------------ | |
| DEF CON 6.0 Convention Announcement #1.00 (03.27.98) | |
| July 31-August 2 @ The Plaza Hotel and Casino in Las Vegas | |
| IN SHORT:-------------------------------------------------------------------- | |
| WHAT: Speakers & partying in Vegas for hackers from the world over. | |
| WHEN: July 31st - August 2nd | |
| WHERE: Las Vegas, Nevada @ The Plaza Hotel and Casino | |
| COSTS: $40 at the door | |
| MORE INFO: http://www.defcon.org/ or email info@defcon.org | |
| 0x28>------------------------------------------------------------------------ | |
| Network Security Solutions Conference Announcement | |
| July 29th and 30th, Las Vegas Nevada | |
| ****************** Call For Papers Announcement *************************** | |
| Network Security Solutions is now accepting papers for its 1998 event. | |
| Papers and requests to speak will be received and reviewed from March 24th | |
| until June 1st. Please submit an outline on a self selected topic | |
| covering either the problems or solutions surrounding network security. | |
| Topics of interest include Intrusion Detection Systems (IDS), distributed | |
| languages, network design, authentication systems, perimeter protection, | |
| and more. Talks will be an hour with a half hour for Q&A. There will be | |
| LCD projectors, overhead, and slide projectors. | |
| Updated announcements will be posted to newsgroups, security mailing lists, | |
| email, or visit the website at http://www.blackhat.com/ | |
| 0x29>------------------------------------------------------------------------ | |
| The Program Chair, Win Treese of Open Market, Inc., and the Program | |
| Committee announce the availability of the Call for Papers for: | |
| 8th USENIX Security Symposium | |
| August 23-26, 1999 | |
| Marriott Hotel, Washington, D.C. | |
| Sponsored by USENIX, the Advanced Computing Systems Association | |
| In cooperation with The CERT Coordination Center | |
| ================================================ | |
| IMPORTANT DATES FOR REFEREED PAPERS | |
| Paper submissions due: March 16, 1999 | |
| Author notification: April 21, 1999 | |
| Camera-ready final papers due: July 12, 1999 | |
| ================================================ | |
| If you are interested in submitting a paper to the committee, proposing | |
| an Invited Talk, or proposing a tutorial, you can find the Call for | |
| Papers at http://www.usenix.org/events/sec99/cfp.html. | |
| The USENIX Security Symposium brings together researchers, practitioners, | |
| system administrators, system programmers, and others interested in the | |
| latest advances in security and applications of cryptography. | |
| Symposium topics include: | |
| Adaptive security and system management | |
| Analysis of malicious code | |
| Applications of cryptographic techniques | |
| Attacks against networks and machines | |
| Authentication & authorization of users, systems & applications | |
| Detecting attacks, intrusions, and computer misuse | |
| Developing secure systems | |
| File and file system security | |
| Network security | |
| New firewall technologies | |
| Public key infrastructure | |
| Security in heterogeneous environments | |
| Security incident investigation and response | |
| Security of agents and mobile code | |
| Technology for rights management & copyright protection | |
| World Wide Web security | |
| ============================================================= | |
| USENIX is the Advanced Computing Systems Association. Its members are | |
| the computer technologists responsible for many of the innovations in | |
| computing we enjoy today. To find out more about USENIX, visit its | |
| web site: http://www.usenix.org. | |
| 0x2a>------------------------------------------------------------------------ | |
| Last Call For Participation - RAID 98 | |
| (also available at http://www.zurich.ibm.com/~dac/RAID98) | |
| First International Workshop on the Recent Advances in Intrusion | |
| Detection | |
| September 14-15, 1998 Louvain-la-Neuve, Belgium | |
| We solicit your participation in the first International Workshop on the | |
| Recent Advances in Intrusion Detection (RAID 98). | |
| This workshop, the first in an anticipated annual series, will bring | |
| together leading figures from academia, government, and industry to talk | |
| about the current state of intrusion detection technologies and paradigms | |
| from the research and commercial perspectives. | |
| We have scheduled RAID 98 immediately before ESORICS 98, at the same time | |
| as CARDIS 98, and at the same location as both of these conferences. This | |
| provides a unique opportunity for the members of these distinct, yet | |
| related, communities to participate in all these events and meet and share | |
| ideas during joined organized external events. | |
| The RAID 98 web site: http://www.zurich.ibm.com/~dac/RAID98, | |
| The ESORICS 98 web site: http://www.dice.ucl.ac.be/esorics98. | |
| The CARDIS 98 web site: http://www.dice.ucl.ac.be/cardis98/ | |
| 0x2b>------------------------------------------------------------------------ | |
| Computer Security Area (ASC) / DGSCA | |
| DISC 98 | |
| "Individual Responsability" | |
| Fifth Computer Security Event In Mexico | |
| Mexico, D.F. November 2-6, 1998 | |
| ========================================================================== | |
| C A L L F O R P A P E R S | |
| The goal of DISC 98 event is to create a conscience about the strategies | |
| of security to protect information between the community who uses computers. | |
| This year the DISC belongs to the most important events of Mexico. | |
| The computing general congress (http://www.org.org.mx/cuarenta) | |
| celebrates forty years of computing in Mexico and convoques those | |
| specialist in computer sucurity to participate on this as lecture. | |
| "Individual responsability" is the slogan of this year and suggest | |
| that the security of an organization should be totally supported | |
| by directive, security responsables, managers, and system's users. | |
| WWW : http://www.asc.unam.mx/disc98 | |
| 0x2c>------------------------------------------------------------------------ | |
| C A L L F O R P A P E R S | |
| Assurance for the Global Convergence: | |
| Enterprise, Infrastructure and Information Operations | |
| InfoWarCon-9 | |
| Mount Royal Hotel, London, UK | |
| December 7-9 | |
| December 7 - Tutorials | |
| December 8-9 General Session. | |
| Sponsors: | |
| MIS Training Institute - www.misti.com | |
| Winn Schwartau, Interpact, Inc. - www.infowar.com | |
| For more information contact: Voice: 508.879.7999 Fax: 508.872.1153 | |
| Exhibitors & Sponsorship: Adam Lennon - Alennon@misti.com | |
| Attendance & Registration: www.misti.com | |
| ----[ EOF | |