home *** CD-ROM | disk | FTP | other *** search
-
-
- <-> Hackers in the MOB <->
-
-
- *****************************************************************
- According to Schmidt, the dollar amounts are only part of
- the story, GTE Telemail, an electronic mail system, was broken
- into by at least four gangs of hackers, he says. "They were
- raising hell. The system got shut down one time for a day. None
- of these people have been charged, nor have any of the 414s been
- charged yet.
-
- "We have a major problem with hackers, phreaks and thieves,"
- says Schmidt, who estimates that 75% of criminal hackers are
- teenagers and the other 25% are adults using teenagers to do
- their dirty work for them.
-
- "Adults are masterminding some of this activity. There are
- industrial spies, people playing the stock market with the
- information- just about any theft or fraud you can do with a
- computer. There are no foreign agents or organized crime yet,
- but it's inevitable," he says. "I believe there are some people
- out there now with possible organized-crime connections.
-
- "It's an epidemic. In practically every upper-middle class
- high school this is going on. I know of a high-school computer
- class in a school in the north Dallas suburbs where the kids are
- trying everything they can think of to get into the CIA
- computers."
-
- "It's a strange culture," says SRI's Parker, "a rite of
- passage among technology-oriented youth. The inner circle of
- hackers say they do it primarily for educational purposes and for
- curiosity. They want to find out what all those computers are
- being used for. There's a meritocracy in the culture, each one
- trying to out do the other. The one who provides the most phone
- numbers and passwords to computer systems rises to the top of the
- hackers.
-
- "For the most part it's malicious mischief," Parker says.
- "They rationalize that they're not really breaking any laws, just
- 'visiting' computers. But that's hard to believe when they also
- say they've got to do their hacking before they turn 18 so they
- don't come under adult jurisdiction. After 18, they have to do
- it vicariously through surrogates. They are some grand old men
- of hacking who egg on the younger ones... There have been some
- cases of a Fagin complex- a gang of kids led by one or more
- adults- in Los Angeles."
-
- Who are the hackers and what secret knowledge do they have?
-
- A 17-year-old youth in Beverly Hills, California, announced
- himself to other hackers on a bulletin board in this way:
- "Interests include exotic weapons, chemicals, nerve gases,
- proprietary information from Pacific Telephone..."
-
- Prized secret knowledge includes the two area codes in North
- America that have not yet installed electronic switching system
- central-office equipment. Using this information you can call
- those areas and use a blue box to blow the central office
- equipment, and then call anywhere in the world without charge.
- Other secret information lets you avoid being traced when you do
- this.
-
- A knowledge of the phone systems lets hackers share one of
- the technological privileges usually available only to large
- corporate customers: long-distance conference calls connecting up
- to 59 hackers. Schmidt estimates there are three or four
- conference calls made every night. The hackers swap more inside
- information during the phone calls.
-
- Thanks to packet-switching networks and the fact that they
- don't have to pay long-distance charfus, time and distance mean
- almost nothing to hackers. Desktop microcompters hook into phone
- lines via modems make it easy to obtain copyrighted software
- without human intervention.
-
- "Software piracy exists only because they can do it over the
- phone long distance without paying for it," Schmidt says. "some
- stuff gets sent through the mail, but very little. There are
- bulletin boards that exist solely for the purpose of pirating
- software. A program called ASCII Express Professional (AE Pro)
- for the Apple was designed specifically for modem-to-modem
- transfers. You can make a copy of anything on that computer. It
- can be copyrighted stuff- WordStar, anything. There are probably
- about three dozen boards like that. Some boards exchange
- information on breaking onto mainframes.
-
- "In 1982 the FBI really didn't know what to do with all this
- information," Schmidt says. "There isn't a national computer-
- crime statue. And unless there's $20,000 involved, federal
- prosecutors won't touch it."
-
- Since then, the public and federal prosecutors' interest has
- picked up. The film War Games and the arrest of 414 group in
- Milwaukee "created a lot of interest on Congress and with other
- people," FBI instructor Lewis says. "But, for ourselves it didn't
- really have any impact."
-
- "We'd been providing the training already," says Jim Barko,
- FBI unit chief of the EFCTU (economic and financial crimes
- training unit). He says public interest may make it easier to
- fight computer crime. "There are more people interested in this
- particular area now as a problem. War Games identified the
- problem. But I think it was just circumstantial that the movie
- came out when it did."
-
- Despite the help of knowledgeable informants like Schmidt,
- tracking down hackers can be frustrating business for the FBI.
- SRI's Parker explains some of the pitfalls of going after
- hackers: "Some FBI agents are very discouraged about doing
- something about the hacking thing. The cost of investigation
- relative to the seriousness of each case is just too high," he
- says. "Also, federal regulations from the Department of Justice
- make it almost impossible for the FBI to deal with a juvenile."
-
- An FBI agent cannot question a juvenile without his parents
- or a guardian being present. The FBI approach has been mostly
- to support lhe local police because local police are the only
- ones who can deal with juveniles. Another difficulty the agency
- faces is the regulations about its jurisdiction.
-
- "There has to be an attack on a government agency, a
- government contractor or a government-insured institution for the
- FBI to have clear-cut jurisdiction," Parker says.
-
- The FBI gets called into a case only after a crime has been
- detected by the complaining party. The FBI has done a generally
- competent job of investigating those crimes it was called in to
- investigate, in Parker's view. But the federal agency's job is
- not to help government or financial institutions attempt to
- prevent crimes, nor is its function to detect the crimes in the
- first place.
-
- "We're not out detecting any type of crime," says Lewis.
- "We like to think we can prevent them. We can make
- recommendations. But do we detect bank robberies or are they
- reported to us? Or kidnapping- do we detect those? Or
- skyjacking? There must be some evidence of crime, a crime over
- which the FBI has jurisdiction. Then we open a case." And
- despite the spate of arrests and crackdowns last summer, it looks
- like the FBI will have its hands full in the future: The hackers
- have not gone away. Like mice running through the utility
- passages of a large office building, they create damage and
- inconvenience, but are tolerated as long as their nuisance
- remains bearable.
-
- That status could change at any time, however.
-
- Meanwhile, little electronic "sting" operations similar to
- Abscam keep the element of danger on the hacker's game. An Air
- Force telephone network called AUTOVON (a private telephone
- system connecting computers on every Air Force installation in
- the world), was reportedly cracked by a hacker last last year.
- The hacker published lists of AUTOVON dialups on a bulletin
- board.
-
- The breach came to the attention `oo the Department of
- Defense on late 1983, but apparently nothing was done to stop the
- hackers. Then, in January, the AUTOVON number was answered in a
- sultry female voice. We wish to thank one and all for allowing
- us to make a record of all calls for the past few months. You
- will be hearing from us real soon. Have a happy New Year."
-
- That's a New Year's message calculated to give any hacker a
- chill.
-
- -End of file-
-
- .
-
-
-
- DOWNLOADED FROM P-80 SYSTEMS.......
-