884 lines
47 KiB
Text
884 lines
47 KiB
Text
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Forty-One, File 12 of 13
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN Phrack World News PWN
|
|
PWN PWN
|
|
PWN Issue 41 / Part 2 of 3 PWN
|
|
PWN PWN
|
|
PWN Compiled by Datastream Cowboy PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
Government Cracks Down On Hacker November 2, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Donald Clark (The San Francisco Chronicle)(Page C1)
|
|
|
|
"Civil Libertarians Take Keen Interest In Kevin Poulsen Case"
|
|
|
|
Breaking new ground in the war on computer crime, the Justice Department plans
|
|
to accuse Silicon Valley's most notorious hacker of espionage.
|
|
|
|
Kevin Lee Poulsen, 27, touched off a 17-month manhunt before being arrested on
|
|
charges of telecommunications and computer fraud in April 1991. A federal
|
|
grand jury soon will be asked to issue a new indictment charging Poulsen with
|
|
violating a law against willfully sharing classified information with
|
|
unauthorized persons, assistant U.S. attorney Robert Crowe confirmed.
|
|
|
|
A 1988 search of Poulsen's Menlo Park storage locker uncovered a set of secret
|
|
orders from a military exercise, plus evidence that Poulsen may have tried to
|
|
log onto an Army data network and eavesdropped on a confidential investigation
|
|
of former Philippine President Ferdinand Marcos. It is not clear whether the
|
|
new charge stems from these or other acts.
|
|
|
|
Poulsen did not hand secrets to a foreign power, a more serious crime, Crowe
|
|
noted. But by using an espionage statute against a U.S. hacker for the first
|
|
time, prosecutors raise the odds of a record jail sentence that could be used
|
|
to deter other electronic break-ins.
|
|
|
|
They could use a stronger deterrent. Using personal computers connected to
|
|
telephone lines, cadres of so-called cyberpunks have made a sport of tapping
|
|
into confidential databases and voicemail systems at government agencies and
|
|
corporations. Though there is no reliable way to tally the damage, a 1989
|
|
survey indicated that computer crimes may cost U.S. business $500 million a
|
|
year, according to the Santa Cruz-based National Center for Computer Crime
|
|
Data.
|
|
|
|
Telephone companies, whose computers and switching systems have long been among
|
|
hackers' most inviting targets, are among those most anxious to tighten
|
|
security. Poulsen allegedly roamed at will through the networks of Pacific
|
|
Bell, for example, changing records and even intercepting calls between Pac
|
|
Bell security personnel who were on his trail.
|
|
|
|
The San Francisco-based utility has been intimately involved in his
|
|
prosecution; Poulsen was actually captured in part because one of the company's
|
|
investigators staked out a suburban Los Angeles supermarket where the fugitive
|
|
shopped.
|
|
|
|
"Virtually everything we do these days is done in a computer --your credit
|
|
cards, your phone bills," said Kurt von Brauch, a Pac Bell security officer who
|
|
tracked Poulsen, in an interview last year. "He had the knowledge to go in
|
|
there and alter them."
|
|
|
|
|
|
BROAD LEGAL IMPACT
|
|
|
|
Poulsen's case could have broad impact because of several controversial legal
|
|
issues involved. Some civil libertarians, for example, question the Justice
|
|
Department's use of the espionage statute, which carries a maximum 10-year
|
|
penalty and is treated severely under federal sentencing guidelines. They
|
|
doubt the law matches the actions of Poulsen, who seems to have been motivated
|
|
more by curiosity than any desire to hurt national security.
|
|
|
|
"Everything we know about this guy is that he was hacking around systems for
|
|
his own purposes," said Mike Godwin, staff counsel for the Electronic Frontier
|
|
Foundation, a public-interest group that has tracked Poulsen's prosecution. He
|
|
termed the attempt to use the statute against Poulsen "brain-damaged."
|
|
|
|
Poulsen, now in federal prison in Pleasanton, has already served 18 months in
|
|
jail without being tried for a crime, much less convicted. Though federal
|
|
rules are supposed to ensure a speedy trial, federal judges can grant extended
|
|
time to allow pretrial preparation in cases of complex evidence or novel legal
|
|
issues.
|
|
|
|
Both are involved here. After he fled to Los Angeles to avoid prosecution,
|
|
for example, Poulsen used a special scrambling scheme on one computer to make
|
|
his data files unintelligible to others. It has taken months to decode that
|
|
data, and the job isn't done yet, Crowe said. That PC was only found because
|
|
authorities intercepted one of Poulsen's phone conversations from jail, other
|
|
sources said.
|
|
|
|
|
|
CHARGES LABELED ABSURD
|
|
|
|
Poulsen declined requests for interviews. His attorney, Paul Meltzer, terms
|
|
the espionage charge absurd. He is also mounting several unusual attacks on
|
|
parts of the government's original indictment against Poulsen, filed in 1989.
|
|
|
|
He complains, for example, that the entire defense team is being subjected to
|
|
15-year background checks to obtain security clearances before key documents
|
|
can be examined.
|
|
|
|
"The legal issues are fascinating," Meltzer said. "The court will be forced to
|
|
make law."
|
|
|
|
Poulsen's enthusiasm for exploring forbidden computer systems became known to
|
|
authorities in 1983. The 17-year-old North Hollywood resident, then using the
|
|
handle Dark Dante, allegedly teamed up with an older hacker to break into
|
|
ARPAnet, a Pentagon-organized computer network that links researchers and
|
|
defense contractors around the country. He was not charged with a crime because
|
|
of his age.
|
|
|
|
Despite those exploits, Poulsen was later hired by SRI International, a Menlo
|
|
Park-based think tank and government contractor, and given an assistant
|
|
programming job with a security clearance. Though SRI won't comment, one
|
|
source said Poulsen's job involved testing whether a public data network, by
|
|
means of scrambling devices, could be used to confidentially link classified
|
|
government networks.
|
|
|
|
But Poulsen apparently had other sidelines. Between 1985 and 1988, the Justice
|
|
Department charges, Poulsen burglarized or used phony identification to sneak
|
|
into several Bay Area phone company offices to steal equipment and confidential
|
|
access codes that helped him monitor calls and change records in Pac Bell
|
|
computers, prosecutors say.
|
|
|
|
|
|
CACHE OF PHONE GEAR
|
|
|
|
The alleged activities came to light because Poulsen did not pay a bill at the
|
|
Menlo/Atherton Storage Facility. The owner snipped off a padlock on a storage
|
|
locker and found an extraordinary cache of telephone paraphernalia. A 19-count
|
|
indictment, which also named two of Poulsen's associates, included charges of
|
|
theft of government property, possession of wire-tapping devices and phony
|
|
identification.
|
|
|
|
One of Poulsen's alleged accomplices, Robert Gilligan, last year pleaded guilty
|
|
to one charge of illegally obtaining Pac Bell access codes. Under a plea
|
|
bargain, Gilligan received three years of probation, a $25,000 fine, and agreed
|
|
to help authorities in the Poulsen prosecution. Poulsen's former roommate,
|
|
Mark Lottor, is still awaiting trial.
|
|
|
|
A key issue in Poulsen's case concerns CPX Caber Dragon, a code name for a
|
|
military exercise in Fort Bragg, North Carolina. In late 1987 or early 1988,
|
|
the government charges, Poulsen illegally obtained classified orders for the
|
|
exercise. But Meltzer insists that the orders had been declassified by the
|
|
time they were seized, and were reclassified after the fact to prosecute
|
|
Poulsen. Crowe said Meltzer has his facts wrong. "That's the same as saying
|
|
we're framing Poulsen," Crowe said. "That's the worst sort of accusation I can
|
|
imagine."
|
|
|
|
Another dispute focuses on the charge of unauthorized access to government
|
|
computers. FBI agents found an electronic copy of the banner that a computer
|
|
user sees on first dialing up an Army network called MASNET, which includes a
|
|
warning against unauthorized use of the computer system. Meltzer says Poulsen
|
|
never got beyond this computer equivalent of a "No Trespassing" sign.
|
|
|
|
Furthermore, Meltzer argues that the law is unconstitutional because it does
|
|
not sufficiently define whether merely dialing up a computer qualifies as
|
|
illegal "access."
|
|
|
|
Meltzer also denies that Poulsen could eavesdrop on calls. The indictment
|
|
accuses him of illegally owning a device called a direct access test unit,
|
|
which it says is "primarily useful" for surreptitiously intercepting
|
|
communications. But Meltzer cites an equipment manual showing that the system
|
|
is specifically designed to garble conversations, though it allows phone
|
|
company technicians to tell that a line is in use.
|
|
|
|
Crowe said he will soon file written rebuttals to Meltzer's motions. In
|
|
addition to the new indictment he is seeking, federal prosecutors in Los
|
|
Angeles are believed to be investigating Poulsen's activities while a fugitive.
|
|
Among other things, Poulsen reportedly taunted FBI agents on computer bulletin
|
|
boards frequented by hackers.
|
|
|
|
|
|
PHONE COMPANIES WORRIED
|
|
|
|
Poulsen's prosecution is important to the government -- and phone companies --
|
|
because of their mixed record so far in getting convictions in hacker cases.
|
|
|
|
In one of the most embarrassing stumbles, a 19-year-old University of Missouri
|
|
student named Craig Neidorf was indicted in February 1990 on felony charges for
|
|
publishing a memorandum on the emergency 911 system of Bell South. The case
|
|
collapsed when the phone company information -- which the government said was
|
|
worth $79,940 -- was shown by the defense to be available from another Bell
|
|
system for just $13.50.
|
|
|
|
Author Bruce Sterling, whose "The Hacker Crackdown" surveys recent high-tech
|
|
crime and punishment, thinks the phone company overstates the dangers from
|
|
young hackers. On the other hand, a Toronto high school student electronically
|
|
tampered with that city's emergency telephone dispatching system and was
|
|
arrested, he noted.
|
|
|
|
Because systems that affect public safety are involved, law enforcement
|
|
officials are particularly anxious to win convictions and long jail sentences
|
|
for the likes of Poulsen.
|
|
|
|
"It's very bad when the government goes out on a case and loses," said one
|
|
computer-security expert who asked not to be identified. "They are desperately
|
|
trying to find something to hang him on."
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Computer Hacker Charged With Stealing Military Secrets December 8, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Taken from the Associated Press
|
|
|
|
SAN FRANCISCO -- A computer hacker has been charged with stealing Air Force
|
|
secrets that allegedly included a list of planned targets in a hypothetical
|
|
war.
|
|
|
|
Former Silicon Valley computer whiz Kevin Poulsen, who was accused in the early
|
|
1980s as part of a major hacking case, was named in a 14-count indictment
|
|
issued Monday.
|
|
|
|
He and an alleged accomplice already face lesser charges of unlawful use of
|
|
telephone access devices, illegal wiretapping and conspiracy.
|
|
|
|
Poulsen, 27, of Los Angeles, faces 7-to-10 years in prison if convicted of the
|
|
new charge of gathering defense information, double the sentence he faced
|
|
previously.
|
|
|
|
His lawyer, Paul Meltzer, says the information was not militarily sensitive and
|
|
that it was reclassified by government officials just so they could prosecute
|
|
Poulsen on a greater charge.
|
|
|
|
A judge is scheduled to rule February 1 on Meltzer's motion to dismiss the
|
|
charge.
|
|
|
|
In the early 1980s, Poulsen and another hacker going by the monicker Dark Dante
|
|
were accused of breaking into UCLA's computer network in one of the first
|
|
prosecutions of computer hacking.
|
|
|
|
He escaped prosecution because he was then a juvenile and went to work at Sun
|
|
Microsystems in Mountain View.
|
|
|
|
While working for Sun, Poulsen illegally obtained a computer tape containing a
|
|
1987 order concerning a military exercise code-named Caber Dragon 88, the
|
|
government said in court papers. The order is classified secret and contains
|
|
names of military targets, the government said.
|
|
|
|
In 1989, Poulsen and two other men were charged with stealing telephone access
|
|
codes from a Pacific Bell office, accessing Pacific Bell computers, obtaining
|
|
unpublished phone numbers for the Soviet Consulate in San Francisco; dealing in
|
|
stolen telephone access codes; and eavesdropping on two telephone company
|
|
investigators.
|
|
|
|
Poulsen remained at large until a television show elicited a tip that led to
|
|
his capture in April 1991.
|
|
|
|
He and Mark Lottor, 27, of Menlo Park, are scheduled to be tried in March. The
|
|
third defendant, Robert Gilligan, has pleaded guilty and agreed to pay Pacific
|
|
Bell $25,000. He is scheduled to testify against Lottor and Poulsen as part of
|
|
a plea bargain.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
CA Computer Whiz Is First Hacker Charged With Espionage December 10, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by John Enders (The Associated Press)
|
|
|
|
SAN JOSE, California -- A 28-year-old computer whiz who reportedly once tested
|
|
Department of Defense security procedures has become the first alleged computer
|
|
hacker to be charged with espionage.
|
|
|
|
The government says Kevin Lee Poulsen stole classified military secrets and
|
|
should go to prison. But his lawyer calls him "an intellectually curious
|
|
computer nerd."
|
|
|
|
Poulsen, of Menlo Park, California, worked in the mid-1980s as a consultant
|
|
testing Pentagon computer security. Because of prosecution delays, he was held
|
|
without bail in a San Jose jail for 20 months before being charged this week.
|
|
|
|
His attorney, Paul Meltzer, says that Poulsen did not knowingly possess
|
|
classified information. The military information had been declassified by the
|
|
time prosecutors say Poulsen obtained it, Meltzer said.
|
|
|
|
"They are attempting to make him look like Julius Rosenberg," Meltzer said of
|
|
the man executed in 1953 for passing nuclear-bomb secrets to the Soviet Union.
|
|
"It's just ridiculous."
|
|
|
|
Poulsen was arrested in 1988 on lesser but related hacking charges. He
|
|
disappeared before he was indicted and was re-arrested in Los Angeles in April
|
|
1991. Under an amended indictment, he was charged with illegal possession of
|
|
classified government secrets.
|
|
|
|
Poulsen also is charged with 13 additional counts, including eavesdropping on
|
|
private telephone conversations and stealing telephone company equipment.
|
|
|
|
If convicted on all counts, he faces up to 85 years in prison and fines
|
|
totaling $3.5 million, said Assistant U.S. Attorney Robert Crowe in San
|
|
Francisco.
|
|
|
|
On Monday (12/7), Poulsen pleaded innocent to all charges. He was handed over
|
|
to U.S. Marshals in San Jose on Wednesday (12/9) and was being held at a
|
|
federal center in Pleasanton near San Francisco.
|
|
|
|
He hasn't been available for comment, but in an earlier letter from prison,
|
|
Poulsen called the charges "ludicrous" and said the government is taking
|
|
computer hacking too seriously.
|
|
|
|
U.S. Attorney John A. Mendez said Wednesday (12/9) that Poulsen is not
|
|
suspected of turning any classified or non-classified information over to a
|
|
foreign power, but he said Poulsen's alleged activities are being taken very
|
|
seriously.
|
|
|
|
"He's unique. He's the first computer hacker charged with this type of
|
|
violation -- unlawful gathering of defense information," Mendez said.
|
|
|
|
Assistant U.S. Attorney Robert Crowe said the espionage charge was entered only
|
|
after approval from the Justice Department's internal security section in
|
|
Washington.
|
|
|
|
The indictment alleges that Poulsen:
|
|
|
|
- Tapped into the Pacific Bell Co.'s computer and collected unpublished
|
|
telephone numbers and employee lists for the Soviet Consulate in San
|
|
Francisco.
|
|
|
|
- Stole expensive telephone switching and other equipment.
|
|
|
|
- Retrieved records of phone company security personnel and checked records of
|
|
their own calls to see if they were following him.
|
|
|
|
- Eavesdropped on telephone calls and computer electronic mail between phone
|
|
company investigators and some of his acquaintances.
|
|
|
|
- Tapped into an unclassified military computer network known as Masnet.
|
|
|
|
- Obtained a classified document on flight orders for a military exercise
|
|
involving thousands of paratroopers at the Army's Fort Bragg in North
|
|
Carolina.
|
|
|
|
The offenses allegedly took place between 1986 and 1988.
|
|
|
|
In 1985, the Palo Alto, California, think tank SRI International hired Poulsen
|
|
to work on military contracts, including a sensitive experiment to test
|
|
Pentagon computer security, according to published reports. SRI has declined
|
|
to comment on the case.
|
|
_______________________________________________________________________________
|
|
|
|
Hacker For Hire October 19, 1992
|
|
~~~~~~~~~~~~~~~
|
|
by Mark Goodman and Allison Lynn (People)(Page 151)
|
|
|
|
"Real-life Sneaker Ian Murphy puts the byte on corporate spies."
|
|
|
|
THERE'S NO PRIVACY THESE DAYS," says Ian Murphy. "Just imagine going into GM's
|
|
or IBM's accounts and wiping them out. You can bring about economic collapse
|
|
by dropping in a virus without them even knowing it." Scoff at your peril,
|
|
Corporate America. Captain Zap -- as Murphy is known in the electronic
|
|
underworld of computer hackers -- claims there's no computer system he can't
|
|
crack, and hence no mechanical mischief he can't wreak on corporations or
|
|
governments. And Murphy, 35, has the track record -- not to mention the
|
|
criminal record -- to back up his boasts.
|
|
|
|
Murphy's fame in his subterranean world is such that he worked as a consultant
|
|
for Sneakers, the hit film about a gang of computer-driven spies (Robert
|
|
Redford, Sidney Poitier, Dan Aykroyd) lured into doing some high-risk
|
|
undercover work for what they believe is the National Security Agency.
|
|
|
|
Murphy loved the way the movie turned out. "It's like a training film for
|
|
hackers," he says, adding that he saw much of himself in the Aykroyd character,
|
|
a pudgy, paranoid fantasist named Mother who, like Murphy, plows through
|
|
people's trash for clues. In fact when Aykroyd walked onscreen covered with
|
|
trash, Murphy recalls, "My friends turned to me and said, 'Wow, that's you!'"
|
|
If that sounds like a nerd's fantasy, then check out Captain Zap's credentials.
|
|
Among the first Americans to be convicted of a crime involving computer break-
|
|
ins, he served only some easy community-service time in 1983 before heading
|
|
down the semistraight, not necessarily narrow, path of a corporate spy.
|
|
|
|
Today, Murphy, 35, is president of IAM Secure Data Systems, a security
|
|
consultant group he formed in 1982. For a fee of $5,000 a day plus expenses,
|
|
Murphy has dressed up as a phone-company employee and cracked a bank's security
|
|
system, he has aided a murder investigation for a drug dealer's court defense,
|
|
and he has conducted a terrorism study for a major airline. His specialty,
|
|
though, is breaking into company security systems -- an expertise he applied
|
|
illegally in his outlaw hacker days and now, legally, by helping companies
|
|
guard against such potential break-ins. Much of his work lately, he says,
|
|
involves countersurveillance -- that is, finding out if a corporation's
|
|
competitors are searching its computer systems for useful information. "It's
|
|
industrial spying," Murphy says, "and it's happening all over the place."
|
|
|
|
Murphy came by his cloak-and-daggerish calling early. He grew up in Gladwyne,
|
|
Pennsylvania, on Philadelphia's Main Line, the son of Daniel Murphy, a retired
|
|
owner of a stevedoring business, and his wife, Mary Ann, an advertising
|
|
executive. Ian recalls, "As a kid, I was bored. In science I did wonderfully.
|
|
The rest of it sucked. And social skills weren't my thing."
|
|
|
|
Neither was college. Ian had already begun playing around with computers at
|
|
Archbishop Carroll High School; after graduation he joined the Navy. He got an
|
|
early discharge in 1975 when the Navy didn't assign him to radio school as
|
|
promised, and he returned home to start hacking with a few pals. In his
|
|
heyday, he claims, he broke into White House and Pentagon computers. "In the
|
|
Pentagon," he says, "we were playing in the missile department, finding out
|
|
about the new little toys they were developing and trying to mess with their
|
|
information. None of our break-ins had major consequences, but it woke them the
|
|
hell up because they [had] all claimed it couldn't be done."
|
|
|
|
Major consequences came later. Murphy and his buddies created dummy
|
|
corporations with Triple-A credit ratings and ordered thousands of dollars'
|
|
worth of computer equipment. Two years later the authorities knocked at
|
|
Murphy's door. His mother listened politely to the charges, then earnestly
|
|
replied, "You have the wrong person. He doesn't know anything about
|
|
computers."
|
|
|
|
Right. Murphy was arrested and convicted of receiving stolen property in 1982.
|
|
But because there were no federal computer-crime laws at that time, he got off
|
|
with a third-degree felony count. He was fined $1,000, ordered to provide
|
|
1,000 hours of community service (he worked in a homeless shelter) and placed
|
|
on probation for 2 1/2 years. "I got off easy," he concedes.
|
|
|
|
Too easy, by his own mother's standards. A past president of Republican Women
|
|
of the Main Line, Mary Ann sought out her Congressman, Larry Coughlin, and put
|
|
the question to him: "How would you like it if the next time you ran for
|
|
office, some young person decided he was going to change all of your files?"
|
|
Coughlin decided he wouldn't like it and raised the issue on the floor of
|
|
Congress in 1983. The following year, Congress passed a national computer-
|
|
crime law, making it illegal to use a computer in a manner not authorized by
|
|
the owner.
|
|
|
|
Meanwhile, Murphy, divorced in 1977 after a brief marriage, had married Carol
|
|
Adrienne, a documentary film producer, in 1982. Marriage evidently helped set
|
|
Murphy straight, and he formed his company -- now with a staff of 12 that
|
|
includes a bomb expert and a hostage expert. Countersurveillance has been
|
|
profitable (he's making more than $250,000 a year and is moving out of his
|
|
parents' house), but it has left him little time to work on his social skills -
|
|
- or for that matter his health. At 5 ft.6 in. and 180 lbs., wearing jeans,
|
|
sneakers and a baseball cap, Murphy looks like a Hollywood notion of himself.
|
|
He has suffered four heart attacks since 1986 but unregenerately smokes a pack
|
|
of cigarettes a day and drinks Scotch long before the sun falls over the
|
|
yardarm.
|
|
|
|
He and Carol divorced in April 1991, after 10 years of marriage. "She got
|
|
ethics and didn't like the work I did," he says. These days Murphy dates --
|
|
but not until he thoroughly "checks" the women he goes out with. "I want to
|
|
know who I'm dealing with because I could be dealing with plants," he explains.
|
|
"The Secret Service plays games with hackers."
|
|
|
|
Murphy does retain a code of honor. He will work for corporations, helping to
|
|
keep down the corporate crime rate, he says, but he won't help gather evidence
|
|
to prosecute fellow hackers. Indeed his rogue image makes it prudent for him
|
|
to stay in the background. Says Reginald Branham, 23, president of Cyberlock
|
|
Consulting, with whom Murphy recently developed a comprehensive antiviral
|
|
system: "I prefer not to take Ian to meetings with CEOs. They're going to
|
|
listen to him and say, 'This guy is going to tear us apart.'" And yet Captain
|
|
Zap, for all his errant ways, maintains a certain peculiar charm. "I'm like
|
|
the Darth Vader of the computer world," he insists. "In the end I turn out to
|
|
be the good guy."
|
|
|
|
(Photograph 1 = Ian Murphy)
|
|
(Photograph 2 = River Phoenix, Robert Redford, Dan Aykroyd, and Sidney Poitier)
|
|
(Photograph 3 = Mary Ann Murphy <Ian's mom>)
|
|
_______________________________________________________________________________
|
|
|
|
Yacking With A Hack August 1992
|
|
~~~~~~~~~~~~~~~~~~~
|
|
by Barbara Herman (Teleconnect)(Page 60)
|
|
|
|
"Phone phreaking for fun, profit & politics."
|
|
|
|
Ed is an intelligent, articulate 18 year old. He's also a hacker, a self-
|
|
professed "phreak" -- the term that's developed in a subculture of usually
|
|
young, middle-class computer whizzes.
|
|
|
|
I called him at his favorite phone booth.
|
|
|
|
Although he explained how he hacks as well as what kinds of hacking he has been
|
|
involved in, I was especially interested in why he hacks.
|
|
|
|
First off, Ed wanted to make it clear he doesn't consider himself a
|
|
"professional" who's in it only for the money. He kept emphasizing that
|
|
"hacking is not only an action, it's a state of mind."
|
|
|
|
Phreaks even have an acronym-based motto that hints at their overblown opinions
|
|
of themselves. PHAC. It describes what they do: "phreaking," "hacking,"
|
|
"anarchy" and "carding." In other words, they get into systems over the
|
|
telecom network (phreaking), gain access (hacking), disrupt the systems
|
|
(political anarchy) and use peoples' calling/credit cards for their personal
|
|
use.
|
|
|
|
Throughout our talk, Ed showed no remorse for hacking. Actually, he had
|
|
contempt for those he hacked. Companies were "stupid" because their systems'
|
|
were so easy to crack. They deserved it.
|
|
|
|
As if they should have been thankful for his mercy, he asked me to imagine what
|
|
would have happened if he really hacked one railway company's system (he merely
|
|
left a warning note), changing schedules and causing trains to collide.
|
|
|
|
He also had a lot of disgust for the "system," which apparently includes big
|
|
business (he is especially venomous toward AT&T), government, the FBI, known as
|
|
"the Gestapo" in phreak circles, and the secret service, whose "intelligence
|
|
reflects what their real jobs should be, secret service station attendants."
|
|
|
|
He doesn't really believe any one is losing money on remote access toll fraud.
|
|
|
|
He figures the carriers are angry not about money lost but rather hypothetical
|
|
money, the money they could have charged for the free calls the hackers made,
|
|
which he thinks are overpriced to begin with.
|
|
|
|
He's also convinced (wrongly) that companies usually don't foot the bill for
|
|
the free calls hackers rack up on their phone systems. "And, besides, if some
|
|
multi-million dollar corporation has to pay, I'm certainly not going to cry for
|
|
them."
|
|
|
|
I know. A twisted kid. Weird. But besides his skewed ethics, there's also a
|
|
bunch of contradictions.
|
|
|
|
He has scorn for companies who can't keep him out, even though he piously warns
|
|
them to try.
|
|
|
|
He dismisses my suggestion that the "little guy" is in fact paying the bills
|
|
instead of the carrier. And yet he says AT&T is overcharging them for the
|
|
"vital" right to communicate with each other.
|
|
|
|
He also contradicted his stance of being for the underdog by calling the
|
|
railway company "stupid" for not being more careful with their information.
|
|
|
|
Maybe a railway company is not necessarily the "little guy," but it hardly
|
|
seems deserving of the insults Ed hurled at it. When I mentioned that a
|
|
hospital in New York was taken for $100,000 by hackers, he defended the hackers
|
|
by irrelevantly making the claim that doctors easily make $100,000 a year.
|
|
Since when did doctors pay hospital phone bills?
|
|
|
|
What Ed is good at is rationalizing. He lessens his crimes by raising them to
|
|
the status of political statements, and yet in the same breath, for example, he
|
|
talks about getting insider info on the stock market and investing once he
|
|
knows how the stock is doing. He knows it's morally wrong, he told me, but
|
|
urged me to examine this society that "believes in making a buck any way you
|
|
can. It's not a moral society."
|
|
|
|
Amazingly enough, the hacker society to which Ed belongs, if I can
|
|
unstatistically use him as a representative of the whole community, is just as
|
|
tangled in the contradictions of capitalism as the "system" they supposedly
|
|
loathe. In fact, they are perhaps more deluded and hypocritical because they
|
|
take a political stance rather than recognizing their crimes for what they are.
|
|
How can Ed or anyone else in the "phreaking" community take seriously their
|
|
claims of being against big business and evil capitalism when they steal
|
|
people's credit-card and calling-card numbers and use them for their own
|
|
profit?
|
|
|
|
The conversation winded down after Ed rhapsodized about the plight of the
|
|
martyred hacker who is left unfairly stigmatized after he is caught, or "taken
|
|
down."
|
|
|
|
One time the Feds caught his friend hacking ID codes, had several phone
|
|
companies and police search his house, and had his computer taken away. Even
|
|
though charges were not filed, Ed complained, "It's not fair."
|
|
|
|
That's right, phreak. They should have thrown him in prison.
|
|
_______________________________________________________________________________
|
|
|
|
Computer Hacker On Side Of Law September 23, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Shelby Grad (Los Angeles Times)(Page B3)
|
|
|
|
COSTA MESA, CA -- Philip Bettencourt's formal title is photo lab supervisor for
|
|
the Costa Mesa Police Department. But on Tuesday afternoon, he served as the
|
|
department's official computer hacker.
|
|
|
|
Bettencourt, pounding the keyboard excitedly as other officers looked on, was
|
|
determined to find information within a stolen computer's vast memory that
|
|
would link the machine to its owner.
|
|
|
|
So far, he had made matches for all but two of the 26 computers recovered
|
|
earlier this month by police as part of a countywide investigation of stolen
|
|
office equipment. This would be number 25.
|
|
|
|
First, he checked the hard drive's directory, searching for a word-processing
|
|
program that might include a form letter or fax cover sheet containing the
|
|
owner's name, address or phone number.
|
|
|
|
When that failed, he tapped into an accounting program, checking for clues on
|
|
the accounts payable menu.
|
|
|
|
"Bingo!" Bettencourt yelled a few minutes into his work. He found an invoice
|
|
account number to a Fountain Valley cement company that might reveal the
|
|
owner's identity. Seconds later, he came across the owner's bank credit-card
|
|
number.
|
|
|
|
And less than a minute after that, Bettencourt hit pay dirt: The name of a
|
|
Santa Ana building company that, when contacted, revealed that it had indeed
|
|
been the victim of a recent computer burglary.
|
|
|
|
"This is great," said Bettencourt, who has been interested in computers for
|
|
nearly two decades now, ever since Radio Shack put its first model on the
|
|
market. "I love doing this. This is hacking, but it's in a good sense, not
|
|
trying to hurt someone. This is helping people."
|
|
|
|
Few computer owners who were reunited with their equipment would contest that.
|
|
When Costa Mesa police recovered $250,000 worth of computers, fax machines,
|
|
telephones and other office gadgets, detectives were faced with the difficult
|
|
task of matching machines bearing few helpful identifying marks to their
|
|
owners, said investigator Bob Fate.
|
|
|
|
Enter Bettencourt, who tapped into the computers' hard drives, attempting to
|
|
find the documents that would reveal from whom the machines were taken.
|
|
|
|
As of Tuesday, all but $50,000 worth of equipment was back in owners' hands.
|
|
Investigators suggested that people who recently lost office equipment call the
|
|
station to determine if some of the recovered gadgetry belongs to them.
|
|
|
|
Ironically, the alleged burglars tripped themselves up by not erasing the data
|
|
from the computers before reselling the machines, authorities said. A college
|
|
student who purchased one of the stolen computers found data from the previous
|
|
owner, whom he contacted. Police were then called in, and a second "buy" was
|
|
scheduled in which several suspects were arrested, Fate said.
|
|
|
|
Three people were arrested September 15 and charged with receiving and
|
|
possessing stolen property. Police are still searching for the burglars.
|
|
|
|
The office equipment was recovered from an apartment and storage facility in
|
|
Santa Ana.
|
|
|
|
Bettencourt matched the final stolen computer to its owner before sundown
|
|
Tuesday.
|
|
_______________________________________________________________________________
|
|
|
|
CuD's 1992 MEDIA HYPE Award To FORBES MAGAZINE
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Jim Thomas (Computer Underground Digest)
|
|
|
|
In recent years, media depiction of "hackers" has been criticized for
|
|
inaccurate and slanted reporting that exaggerates the public dangers of the
|
|
dread "hacker menace." As a result, CuD annually recognizes the year's most
|
|
egregious example of media hype.
|
|
|
|
The 1992 annual CuD GERALDO RIVERA MEDIA HYPE award goes to WILLIAM G. FLANAGAN
|
|
AND BRIGID McMENAMIN for their article "The Playground Bullies are Learning how
|
|
to Type" in the 21 December issue of Forbes (pp 184-189). The authors improved
|
|
upon last year's winner, Geraldo himself, in inflammatory rhetoric and
|
|
distorted narrative that seems more appropriate for a segment of "Inside
|
|
Edition" during sweeps week than for a mainstream conservative periodical.
|
|
|
|
The Forbes piece is the hands-down winner for two reasons. First, one reporter
|
|
of the story, Brigid McMenamin, was exceptionally successful in creating for
|
|
herself an image as clueless and obnoxious. Second, the story itself was based
|
|
on faulty logic, rumors, and some impressive leaps of induction. Consider the
|
|
following.
|
|
|
|
|
|
The Reporter: Brigid McMenamin
|
|
|
|
It's not only the story's gross errors, hyperbole, and irresponsible distortion
|
|
that deserve commendation/condemnation, but the way that Forbes reporter Brigid
|
|
McMenamin tried to sell herself to solicit information.
|
|
|
|
One individual contacted by Brigid McM claimed she called him several times
|
|
"bugging" him for information, asking for names, and complaining because
|
|
"hackers" never called her back. He reports that she explicitly stated that
|
|
her interest was limited to the "illegal stuff" and the "crime aspect" and was
|
|
oblivious to facts or issues that did not bear upon hackers-as-criminals.
|
|
|
|
Some persons present at the November 2600 meeting at Citicorp, which she
|
|
attended, suggested the possibility that she used another reporter as a
|
|
credibility prop, followed some of the participants to dinner after the
|
|
meeting, and was interested in talking only about illegal activities. One
|
|
observer indicated that those who were willing to talk to her might not be the
|
|
most credible informants. Perhaps this is one reason for her curious language
|
|
in describing the 2600 meeting.
|
|
|
|
Another person she contacted indicated that she called him wanting names of
|
|
people to talk to and indicated that because Forbes is a business magazine, it
|
|
only publishes the "truth." Yet, she seemed not so much interested in "truth,"
|
|
but in finding "evidence" to fit a story. He reports that he attempted to
|
|
explain that hackers generally are interested in Unix and she asked if she
|
|
could make free phone calls if she knew Unix. Although the reporter stated to
|
|
me several times that she had done her homework, my own conversation with her
|
|
contradicted her claims, and if the reports of others are accurate, here claims
|
|
of preparation seem disturbingly exaggerated.
|
|
|
|
I also had a rather unpleasant exchange with Ms. McM. She was rude, abrasive,
|
|
and was interested in obtaining the names of "hackers" who worked for or as
|
|
"criminals." Her "angle" was clearly the hacker-as-demon. Her questions
|
|
suggested that she did not understand the culture about which she was writing.
|
|
She would ask questions and then argue about the answer, and was resistant to
|
|
any "facts" or responses that failed to focus on "the hacker criminal." She
|
|
dropped Emmanuel Goldstein's name in a way that I interpreted as indicating a
|
|
closer relationship than she had--an incidental sentence, but one not without
|
|
import -- which I later discovered was either an inadvertently misleading
|
|
choice of words or a deliberate attempt to deceptively establish credentials.
|
|
She claimed she was an avowed civil libertarian. I asked why, then, she didn't
|
|
incorporate some of those issues. She invoked publisher pressure. Forbes is a
|
|
business magazine, she said, and the story should be of interest to readers.
|
|
She indicated that civil liberties weren't related to "business." She struck
|
|
me as exceptionally ill-informed and not particularly good at soliciting
|
|
information. She also left a post on Mindvox inviting "hackers" who had been
|
|
contacted by "criminals" for services to contact her.
|
|
|
|
>Post: 150 of 161
|
|
>Subject: Hacking for Profit?
|
|
>From: forbes (Forbes Reporter)
|
|
>Date: Tue, 17 Nov 92 13:17:34 EST
|
|
>
|
|
>Hacking for Profit? Has anyone ever offered to pay you (or
|
|
>a friend) to get into a certain system and alter, destroy or
|
|
>retrieve information? Can you earn money hacking credit
|
|
>card numbers, access codes or other information? Do you know
|
|
>where to sell it? Then I'd like to hear from you. I'm
|
|
>doing research for a magazine article. We don't need you
|
|
>name. But I do want to hear your story. Please contact me
|
|
>Forbes@mindvox.phantom.com.
|
|
|
|
However, apparently she wasn't over-zealous about following up her post or
|
|
reading the Mindvox conferences. When I finally agreed to send her some
|
|
information about CuD, she insisted it be faxed rather than sent to Mindvox
|
|
because she was rarely on it. Logs indicate that she made only six calls to
|
|
the board, none of which occurred after November 24.
|
|
|
|
My own experience with the Forbes reporter was consistent with those of others.
|
|
She emphasized "truth" and "fact-checkers," but the story seems short on both.
|
|
She emphasized explicitly that her story would *not* be sensationalistic. She
|
|
implied that she wanted to focus on criminals and that the story would have the
|
|
effect of presenting the distinction between "hackers" and real criminals.
|
|
Another of her contacts also appeared to have the same impression. After our
|
|
less-than-cordial discussion, she reported it to the contact, and he attempted
|
|
to intercede on her behalf in the belief that her intent was to dispel many of
|
|
the media inaccuracies about "hacking." If his interpretation is correct, then
|
|
she deceived him as well, because her portrayal of him in the story was
|
|
unfavorably misleading.
|
|
|
|
In CuD 4.45 (File #3), we ran Mike Godwin's article on "How to Talk to the
|
|
Press," which should be required reading. His guidelines included:
|
|
|
|
1) TRY TO THINK LIKE THE REPORTER YOU'RE TALKING TO.
|
|
2) IF YOU'RE GOING TO MEET THE REPORTER IN PERSON, TRY TO
|
|
BRING SOMETHING ON PAPER.
|
|
3) GIVE THE REPORTER OTHER PEOPLE TO TALK TO, IF POSSIBLE.
|
|
4) DON'T ASSUME THAT THE REPORTER WILL COVER THE STORY THE WAY
|
|
YOU'D LIKE HER TO.
|
|
|
|
Other experienced observers contend that discussing "hacking" with the press
|
|
should be avoided unless one knows the reporter well or if the reporter has
|
|
established sufficient credentials as accurate and non-sensationalist. Using
|
|
these criteria, it will probably be a long while before any competent
|
|
cybernaught again speaks to Brigid McMenamin.
|
|
|
|
|
|
The Story
|
|
|
|
Rather than present a coherent and factual story about the types of computer
|
|
crime, the authors instead make "hackers" the focal point and use a narrative
|
|
strategy that conflates all computer crime with "hackers."
|
|
|
|
The story implies that Len Rose is part of the "hacker hood" crowd. The lead
|
|
reports Rose's prison experience and relates his feeling that he was "made an
|
|
example of" by federal prosecutors. But, asks the narrative, if this is so,
|
|
then why is the government cracking down? Whatever else one might think of Len
|
|
Rose, no one ever has implied that he as a "playground bully" or "hacker hood."
|
|
The story also states that 2600 Magazine editor Emmanuel Goldstein "hands
|
|
copies <of 2600> out free of charge to kids. Then they get arrested." (p. 188-
|
|
-a quote attributed to Don Delaney), and distorts (or fabricates) facts to fit
|
|
the slant:
|
|
|
|
According to one knowledgeable source, another hacker brags
|
|
that he recently found a way to get into Citibank's
|
|
computers. For three months he says he quietly skimmed off a
|
|
penny or so from each account. Once he had $200,000, he quit.
|
|
Citibank says it has no evidence of this incident and we
|
|
cannot confirm the hacker's story. But, says computer crime
|
|
expert Donn Parker of consultants SRI International: "Such a
|
|
'salami attack' is definitely possible, especially for an
|
|
insider" (p. 186).
|
|
|
|
Has anybody calculated how many accounts one would have to "skim" a few pennies
|
|
from before obtaining $200,000? At a dime apiece, that's over 2 million. If
|
|
I'm figuring correctly, at one minute per account, 60 accounts per minute non-
|
|
stop for 24 hours a day all year, it would take nearly 4 straight years of on-
|
|
line computer work for an out-sider. According to the story, it took only 3
|
|
months. At 20 cents an account, that's over a million accounts.
|
|
|
|
Although no names or evidence are given, the story quotes Donn Parker of SRI as
|
|
saying that the story is a "definite possibility." Over the years, there have
|
|
been cases of skimming, but as I remember the various incidents, all have been
|
|
inside jobs and few, if any, involved hackers. The story is suspiciously
|
|
reminiscent of the infamous "bank cracking" article published in Phrack as a
|
|
spoof several years ago.
|
|
|
|
The basis for the claim that "hacker hoods" (former "playground bullies") are
|
|
now dangerous is based on a series of second and third-hand rumors and myths.
|
|
The authors then list from "generally reliable press reports" a half-dozen or
|
|
so non-hacker fraud cases that, in context, would seem to the casual reader to
|
|
be part of the "hacker menace." I counted in the article at least 24 instances
|
|
of half-truths, inaccuracies, distortions, questionable/spurious links, or
|
|
misleading claims that are reminiscent of 80s media hype. For example, the
|
|
article attributes to Phiber Optik counts in the MOD indictment that do not
|
|
include him, misleads on the Len Rose indictment and guilty plea, uses second
|
|
and third hand information as "fact" without checking the reliability, and
|
|
presents facts out of context (such as attributing the Morris Internet worm to
|
|
"hackers).
|
|
|
|
Featured as a key "hacker hood" is "Kimble," a German hacker said by some to be
|
|
sufficiently media-hungry and self-serving that he is ostracized by other
|
|
German hackers. His major crime reported in the story is hacking into PBXes.
|
|
While clearly wrong, his "crime" hardly qualifies him for the "hacker
|
|
hood/organized crime" danger that's the focus of the story. Perhaps he is
|
|
engaged in other activities unreported by the authors, but it appears he is
|
|
simply a run-of-the-mill petty rip-off artist. In fact, the authors do not make
|
|
much of his crimes. Instead, they leap to the conclusion that "hackers" do the
|
|
same thing and sell the numbers "increasingly" to criminals without a shred of
|
|
evidence for the leap. To be sure the reader understands the menace, the
|
|
authors also invoke unsubstantiated images of a hacker/Turkish Mafia connection
|
|
and suggest that during the Gulf war, one hacker was paid "millions" to invade
|
|
a Pentagon computer and retrieve information from a spy satellite (p. 186).
|
|
|
|
Criminals use computers for crime. Some criminals may purchase numbers from
|
|
others. But the story paints a broader picture, and equates all computer crime
|
|
with "hacking." The authors' logic seems to be that if a crime is committed
|
|
with a computer, it's a hacking crime, and therefore computer crime and
|
|
"hackers" are synonymous. The story ignores the fact that most computer crime
|
|
is an "inside job" and it says nothing about the problem of security and how
|
|
the greatest danger to computer systems is careless users.
|
|
|
|
One short paragraph near the end mentions the concerns about civil liberties,
|
|
and the next paragraph mentions that EFF was formed to address these concerns.
|
|
However, nothing in the article articulates the bases for these concerns.
|
|
Instead, the piece promotes the "hacker as demon" mystique quite creatively.
|
|
|
|
The use of terms such as "new hoods on the block," "playground bullies," and
|
|
"hacker hoods" suggests that the purpose of the story was to find facts to fit
|
|
a slant.
|
|
|
|
In one sense, the authors might be able to claim that some of their "facts"
|
|
were accurate. For example, the "playground bullies" phrase is attributed to
|
|
Cheshire Catalyst. "Gee, *we* didn't say it!" But, they don't identify
|
|
whether it's the original CC or not. The phrase sounds like a term used in
|
|
recent internecine "hacker group" bickering, and if this was the context, it
|
|
hardly describes any new "hacker culture." Even so, the use of the phrase
|
|
would be akin to a critic of the Forbes article referring to it as the product
|
|
of "media whores who are now getting paid for doing what they used to do for
|
|
free," and then applying the term "whores" to the authors because, hey, I
|
|
didn't make up the term, somebody else did, and I'm just reporting (and using
|
|
it as my central metaphor) just the way it was told to me. However, I suspect
|
|
that neither Forbes' author would take kindly to being called a whore because
|
|
of the perception that they prostituted journalistic integrity for the pay-off
|
|
of a sexy story. And this is what's wrong with the article: The authors take
|
|
rumors and catch-phrases, "merely report" the phrases, but then construct
|
|
premises around the phrases *as if* they were true with little (if any)
|
|
evidence. They take an unconfirmed "truth" (where are fact checkers when you
|
|
need them) or an unrelated "fact" (such as an example of insider fraud) and
|
|
generalize from a discrete fact to a larger population. The article is an
|
|
excellent bit of creative writing.
|
|
|
|
|
|
Why Does It All Matter?
|
|
|
|
Computer crime is serious, costly, and must not be tolerated. Rip-off is no
|
|
joke. But, it helps to understand a problem before it can be solved, and lack
|
|
of understanding can lead to policies and laws that are not only ineffective,
|
|
but also a threat to civil liberties. The public should be accurately informed
|
|
of the dangers of computer crime and how it can be prevented. However, little
|
|
will be served by creating demons and falsely attributing to them the sins of
|
|
others. It is bad enough that the meaning" of the term "hacker" has been used
|
|
to apply both to both computer delinquents and creative explorers without also
|
|
having the label extended to include all other forms of computer criminals as
|
|
well.
|
|
|
|
CPSR, the EFF, CuD, and many, many others have worked, with some success, to
|
|
educate the media about both dangers of computer crime and the dangers of
|
|
inaccurately reporting it and attributing it to "hackers." Some, perhaps most,
|
|
reporters take their work seriously, let the facts speak to them, and at least
|
|
make a good-faith effort not to fit their "facts" into a narrative that--by one
|
|
authors' indication at least -- seems to have been predetermined.
|
|
|
|
Contrary to billing, there was no evidence in the story, other than
|
|
questionable rumor, of "hacker" connection to organized crime. Yet, this type
|
|
of article has been used by legislators and some law enforcement agents to
|
|
justify a "crackdown" on conventional hackers as if they were the ultimate
|
|
menace to society. Forbes, with a paid circulation of over 735,000 (compared
|
|
to CuDs unpaid circulation of only 40,000), reaches a significant and
|
|
influential population. Hysterical stories create hysterical images, and these
|
|
create hysteria-based laws that threaten the rights of law-abiding users. When
|
|
a problem is defined by irresponsibly produced images and then fed to the
|
|
public, it becomes more difficult to overcome policies and laws that restrict
|
|
rights in cyberspace.
|
|
|
|
The issue is not whether "hackers" are or are not portrayed favorably. Rather,
|
|
the issue is whether images reinforce a witch-hunt mentality that leads to the
|
|
excesses of Operation Sun Devil, the Steve Jackson Games fiasco, or excessive
|
|
sentences for those who are either law-abiding or are set up as scapegoats.
|
|
The danger of the Forbes article is that it contributes to the persecution of
|
|
those who are stigmatized not so much for their acts, but rather for the signs
|
|
they bear.
|